text
stringlengths
25
68.8k
quality
float64
1
2.58
source
stringclasses
5 values
FAQPage Forgetful, or Something More? Symptoms of Huntington's You Might Ignore. #LetsTalkAboutHD is a social media campaign whose creation was to bring hope and awareness to Huntington's Disease, HD. The disease affects one out of every 10,000 people a year, which is about 30,000 people in the United States. In order to find effective treatments to slow the disease, the campaign was created in May 2016, which is fitting because May is Huntington's Disease Awareness month. It hopes to raise funding for more tests by getting families to share their experiences with HD, so the world hears it and takes action. George Huntington was 22 years old when he first discovered the debilitating brain disease. The disease can affect juveniles, but symptoms usually begin when a person is in their 30s and 40s. People of European descent have a higher chance of getting the mutated gene that progresses the disease over time. Huntington's disease is a brain disorder that kills the brain's nerve cells over time. Huntington's disease is a brain disorder that kills the brain's nerve cells over time. What Exactly Is Huntington's Disease? Huntington's disease is a brain disorder caused by toxin proteins collecting in the brain. The huntingtin (HTT) gene provides instructions for the body to create a protein called "huntingtin". Huntingtin is an important protein found in tissue and the brain. Mutations in the HTT gene, tells the brain to create extra DNA that leads to the production of longer-than-normal protein. Essentially, the DNA is in a repeating sequence. Damage occurs to the brain's cells and neurons over time, leading to neurological symptoms, such as impaired posture, abnormal or slow eye movements, and difficulty swallowing and talking. As it progresses, it will eventually cause uncontrolled movements, emotional problems, and cognitive issues. The average adult brain is about 3 pounds, and someone with HD at its final stages will have a brain that weighs about a pound less, that's 30% less! The disease will have eaten away so much of the brain's nerve cells, causing bigger openings in the brain. A less common form of Huntington's disease is the juvenile form of it. It is diagnosed in about 5-10 percent of all HD cases. It begins in childhood, and can mask itself as normal child-like and teenage behavioral issues such as aggression, depression, and impulsiveness. Because of this, many children and young people get misdiagnosed, until it is too late. Juvenile Huntington's tends to progress more quickly, which is why people diagnosed with it are in more danger. After symptoms appear, those affected usually only live 10-15 years. What Are The Symptoms? The symptoms of Huntington's are similar to those of ALS, Parkinson's, and Alzheimer's. It affects your movement, cognitive functions, and mental functions. Symptoms include: - Trouble balancing -many people with Huntington's die due to imbalance. - Trouble swallowing- in the later stages, the risk of choking is high - Involuntary movements such as twitching and jerking around - Difficulty speaking - Memory issues - Difficulty focusing - Poor impulse control - Depression- one of the early signs of Huntington's, along with irritability. - Obsessive-compulsive disorder can occur - Bi-polar disorder can occur For people younger than 20 with Juvenile Huntington's, symptoms are often behavioral, and emotional. This includes moodiness, aggression, stubbornness, anger, frustration, and depression. Many kids and teens experience this range of emotion, which makes it hard to diagnose. Additional signs include seizures, slow movements, balance HD occurs from mutations in the huntingtin gene. It is genetic and passed down from parents who have the disease. HD occurs from mutations in the huntingtin gene. It is genetic and passed down from parents who have the disease. issues, loss of motor skills, slurred speech, a decline in school performance, and impaired reasoning abilities. Between 30-50% of people with Juvenile Huntington's disease will have seizures. Is it Genetic? Huntington's disease is an autosomal dominant disorder, meaning that one copy of the altered gene is inherited from a parent. If the mother is the one affected with the disease, then the child will most likely develop it at the same age their mother developed it. If the father is the one affected by it, then developing the disease will potentially happen at an earlier age than when the father developed it. Each child has a 50% chance of inheriting the faulty gene. The disease never skips a generation. Is There A Cure? Unfortunately, there is no cure for Huntington's disease. There is also no treatment that can reverse its progression or slow it down. However, it can be managed. A healthy diet and exercise will contribute to improving the person's physical and mental health. Medications can help with involuntary movements. Speech therapy can help the person communicate more effectively, physical therapy can help improve muscle strength and flexibility, leading to better balance. Lastly, occupational therapy can help a person create strategies for coping with memory and concentration issues. With therapy, HD can be managed, providing the person a better quality of life. With therapy, HD can be managed, providing the person a better quality of life. Diagnosis Because HD is a genetic disease, family and medical history are important for your doctor to be aware of. This way, the doctor can make judgments on genetic testing to confirm the disease. The doctor can also refer a patient to a neurologist, where they can order a CT or MRI scan to identify changes in the brain structures. Huntington's disease is a rare genetic illness that takes a toll on a person's life. It is important to be aware of your family and medical history, and seek testing to confirm suspicions. This is especially important for children and teens who might have the disease and it gets brushed off as "normal growing behaviors". People with HD can still live to their full potential. Through a healthy diet, speech therapy, occupational therapy, and physical therapy, a person with HD can improve their quality of life. About The Author: Cassandra Love With over a decade of helpful content experience Cassandra has dedicated her career to making sure people have access to relevant, easy to understand, and valuable information. After realizing a huge knowledge gap Cassandra spent years researching and working with health insurance companies to create accessible guides and articles to walk anyone through every aspect of the insurance process. Follow us for more: Leave a Reply Your email address will not be published. Required fields are marked *
2.336911
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
he supreme hatred of Talmudic Judaism is reserved for and directed against the hated "adherers to the text" of Scripture who are, thus, accused of spurning the words of the Pharisee "Sages," as enshrined in the Babylonian Talmud. These "adherers" to the Bible are classified as the primary enemies of Judaism. They are all "idolators," "heathen," "goy." They rank not only as animals — like the rest of the non-Jewish human race, but as the lowest and most despised form of life. The Talmud frequently refers to Bible adherents scathingly as "Samaritans" and "Cutheans," phraseology similarly used to excoriate The Sadducees were the first of these enemies. They were the constant opponents of the Pharisees and their imported Babylonian paganism, misrepresented by the Pharisees as the Tradition of the Elders, the "Oral Law" ostensibly transmitted privately to Moses and on down, superseding anything written in the Bible. In the six years of civil war between the Pharisees and Alexander Jannaeus, King and High Priest of Jerusalem, 50,000 were killed on both sides before this Sadducean ruler succumbed, and his widow Salome turned affairs over to the Pharisees in 79 B.C. Her brother, Simon ben Shetah, had been waiting for such an opportunity. The continued civil war resulted in the sons of Alexander Jannaeus, Hyrcanus and Aristobulus, in 63 B.C., going hat in hand to Pompey, Caesar's Roman General in Syria, asking him to invade Palestine and slaughter their respective opponents. This is how Rome happened to be in power when Christ was born. Only after Christ's Ascension did the Pharisees Other enemies have been the Samaritans, whom Our Lord seemed to favor. They had been brought in from Cutha and other far places in the World Assyrian Empire, to take the place of the ten Israel tribes deported in 721 B.C. They had adopted Biblical Judaism and opposed the return from Babylon in 536 B.C. of the Pharisee-run population. Each year a handful of Samaritans celebrate Passover on the site of their former temple at Mt. Gerizim, an event contemptuously referred to by American The Karaites arose in the 8th century in Babylonia under Anan to plague the Pharisee top element by scorning the Talmud and holding up the Bible as supreme authority. A molten stream of hatred, therefore, was turned on them. With true Talmudic "Brotherhood" and "tolerance," Anan was expelled from Babylonia, and founded the Karaite sect in Jerusalem. Later, when the few remaining thousands of Karaites were favored by the Czar of Russia, although classed as "untouchables" by Talmudists, the latter offered to join the Karaites to get immunity from Czarist displeasure — but the Karaites turned them down as hypocrites. The supreme curses the Karaites have shared with Christians are due to the adherence of the Karaites to the Bible, instead of the "sages," or Jewish Talmud. They are likened to the Sadducees and Samaritans in this. (See Exhibit 25, and The ultimate object of hatred in Talmudic Judaism is Christ, and the targets of Talmudic hatred are not just Gentile non-Jews, "the people who are like an ass — slaves who are considered the property of the master" (Talmud, Kethuboth 111a). Of these non-Jews, the Christians are most insanely hated and loathed because their doctrines are the opposite of every Talmudic doctrine. They rank not just as animals, like the rest of non-Talmudic humanity, but almost as vermin, to be eradicated. Language in the Talmud is virtually exhausted to find foul and hated names for Christians. Min (plural Minim) is used throughout the Talmud as a term to designate Christians. In the "Shemoneh Esreh," or 18 Benedictions, the word has been changed from time to time as wary non-Jews become aware of its meaning. Note at the left column of Exhibit 284 that "Zaddukim" was substituted, and "Apikoresim." In the right column of Exhibit 284 we see "Epicureans" substituted by Maimonides (a Talmudic pillar). Reference is made to uncensored Talmud editions of (left column, same Exhibit), Sanhedrin 27a, Horayoth 11a, and Gittin 45a. The Berechoth statement reads: "The benediction relating to the minim was instituted in Jabneh [Palestine] after the rest." The harangue goes on to decree vengeance against anyone leaving out the benediction against the minim, "because we suspect him of "The censored [ie. editions] have mumuar," says this exhibit from the Jewish Encyclopedia, instead of minim. And, in Sanhedrin 27a, mumar is used to denounce as wholly disqualified one who eats meat which is not slaughtered in kosher manner, thus showing "his contempt for the law" (of the Talmud). The Talmud Gittin 45b reference states that "a scroll of the Law which has been written by a min should be burnt." Distilled hate is the theme. [See Sabbath 116a] The Horayoth 11a citation from the Talmud (page 79 of the Soncino edition, not reproduced here), is another tirade against those who rank below "common people" — the minim. It cites those who drink wine dedicated to an idol, referring to Holy Communion. Christ is always the "idol" denounced by the Talmud, while real idolatry in regard to spirits, planets, child burning to Molech, Baal filth, are permitted in Present day Jews keep up a continual propaganda that burning anti-Christian, immoral or subversive books is the depth of bigotry, bias and intolerance. But the teaching in Sabbath 111a [correction: Sabbath 116a] of the Talmud is even cited in the Jewish Encyclopedia (under Gentiles), which holds that Christian books should be burned "without regard to the name of God appearing therein." (See Exhibit 273, right hand Characteristic of charging as a crime against others what Talmudists themselves are doing, a Sanhedrin passage denounces Christ as a sorcerer (Talmud, Exhibit 76). It was to refute this Talmudic teaching of hate against Christ, that Martin Luther wrote his "Shemhamphoras" on the charge that Christ did His miracles by sorcery, using the Tetragrammaton, which, in some Talmud passages, He is said to have stolen and hidden in His Christ was amazingly correct in designating the Talmudic Pharisees as children of the Father of Lies. Christianity Calls from Hell Christianity is likened in the Talmud to one of two daughters of a horse-leech calling from hell, "Bring, bring!" One is the government — "Which constantly imposes fresh taxes and duties" and the other "Minuth" (Christianity) — "Which continually lures the unwary to its erroneous teaching" — a Biblical verse is then misused as a curse "applied to those converted to idolatry" (Christianity). Then another says the voice of hell is calling to bring these two "daughters," "who cry and call in this world," back to hell. (See The Talmud speaks of a woman who confessed that her younger son was the offspring of her older son and that incest was her lightest sin, and wanted to die in peace but could not, for if incest was her lightest sin "it may be assumed that she had also adopted minuth [Christianity] … that is why she did not die …. Since she said of her guilt that it is one of the lightest, it may be assumed that she was guilty of idolatry [Christianity] also." A tale follows about a Rabbi who visited every harlot in the world, crossing seven rivers to get at the last one. He is allowed to die in peace because he had not committed the unforgivable minuth (Christianity). (Talmud, Abodah Zarah l7a, Exhibit 180) Death from Snakebite Preferable The Talmud says that Rabbi Ishmael (sage) has a nephew who is bitten by a snake and wants to let Jacob, a Disciple of Jesus, heal him, but dies in the middle of the sentence. The Rabbi thereupon exclaims: "Happy art thou Ben Dama for thou wert pure in body and thy soul likewise left thee in purity …." His joy was because, of course, it was preferable to die of snakebite
1.769297
HuggingFaceFW/fineweb-edu
Right-of-way valuation, or corridor appraisal, requires unique methodologies, skills, and corridor factor data rarely found among appraisal firms. Corridor appraisal methodologies used include "across-the-fence" and "corridor factor" analysis. Selecting and utilizing the appropriate methodology given the appraisal problem at hand is of the utmost importance. Equally important is the ability to review appraisals and analyze methodologies used by others, and provide consulting and advisory services backed up by credible expert witness testimony when the need arises. JRES provides a variety of right-of-way and corridor services: - Value individual properties or consulting on appraising rights of way and corridors - Consult and advise regarding identification of the larger parcel for eminent domain appraisal - Select appropriate valuation methodology including across the fence or corridor factor analysis - Conduct due diligence into property specific physical, legal, and governmental constraints - Evaluate property value trends over historical time periods - Review appraisal reports and provide expert witness testimony To speak with an expert in right-of-way valuation or corridor appraisal, please call _PHONE_ or fill out our contact form.
1.015945
openbmb/Ultra-FineWeb
Skip navigation Autism Speaks Calls to Action Stimulus Preceding Negativity and Social Stimuli in Autism Spectrum Disorder City: La Jolla State/Province: CA State/Province Full: California Country: United States The proposed research uses brain measures to assess the processing of social signals in individuals with autism spectrum disorders (ASD). The primary aim is to assess whether individuals with ASD show deficits in the neural markers of reward in response to social feedback. The social motivation hypothesis proposes that key deficits found in individuals with ASD (e.g., poor joint attention, eye contact, and social cognition) are underpinned by deeper motivational differences. The hypothesis is that individuals with ASD are less rewarded by engagement in social activities than typically developing individuals, and that a specific neural marker will help elucidate this difference. This project will investigate a neural component of the event-related potential (ERP) signal, namely the stimulus preceding negativity (SPN) component. Previous research shows that the SPN is a sensitive measure of activity in the dopaminergic reward pathway and anticipation of reward. Both typically developing children and adults, and children and adults with ASD, will be tested to assess their responses to social and nonsocial stimuli. The results from this social neuroscience study may identify biomarkers that can improve risk assessment and subtype stratification in individuals with ASD. Moreover, the results will be informative for designing interventions (both pharmacological and behavioral) that can be specifically tailored to improve social motivation, especially for those individuals who are more severely impaired. An interdisciplinary team of neuroscientists and research-practitioners in autism science, along with neuroscientists who specialize in the design of ERP studies investigating the SPN component, has been assembled to assist in the conduct of this project.
2.499138
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Vitamins are essential for human health. A special group is occupied by B vitamins, which are sold in the pharmacy in the form of ampoules, which are not used for anything. They have proven themselves both as therapeutic and cosmetic means. - Vitamins of group B in ampoules: their effect on the body - B vitamins in ampoules: indications for use - Vitamin B ampoules: drug names - Vitamin B in ampoules: instructions for use - Vitamin B1 in ampoules: instructions for use - Vitamin B6 in ampoules: how to apply - Vitamin B5 in ampoules: how to apply - Vitamin B12 in ampoules: instructions for use - Vitamins B in ampoules for hair: instructions for use - Hair mask with vitamins in ampoules - How to use vitamin B in ampoules for face - B vitamins: contraindications - Group B Vitamins Video Vitamins of group B in ampoules: their effect on the body Group B vitamins include 12 elements, each of which has its own beneficial effect on the body. All vitamins of this group are presented in the table: |Item name||Action taken| |B1 – Thiamine Hydrochloride||It is responsible for the regulation of energy metabolism, it is necessary for the nervous and muscle systems, ensures the proper functioning of the heart, acts on the bone marrow| |B2 – riboflavin||Regulates metabolism, normalizes the breakdown of fats, proteins and carbohydrates entering the body, affects the organs of vision and skin| |B3 – PP||Essential for metabolism and hormones, promotes the production of fats and proteins, has a good effect on the nervous system| |B4 – Choline||Provides liver fat metabolism, helps improve memory| |B5 – pantothenic acid||Promotes the renewal of mucous membranes, positively affects the skin, updating it| |B6 – Pyridoxine Hydrochloride||Responsible for the formation of neurotransmitters, supporting normal functioning of the nervous system| |B7 – Biotin||It is important for the health of the skin, hair, nail plates| |B8 – Inositol||Provides vascular strength, protects them from the formation of blood clots and various pathologies. It has a positive effect on the brain, supports the nervous system in normal| |B9 – Folic Acid||Organizes the correct process of cell division, forms nucleic acids| |B10 – para-aminobenzoic acid||Promotes the absorption of protein entering the body, forms the right amount of red bodies in the blood. It has a good effect on the skin.| |B11 – Levocarnitine||It affects metabolic processes, supports the body with strong physical exertion| |B12 – Cyanocobalamin||Organizes the processes of blood formation in the bone marrow, is necessary for the proper functioning of the nervous system| B vitamins in ampoules: indications for use Vitamin B in ampoules, for which injection therapy is used, is usually prescribed if necessary to quickly saturate the body with vitamins. Intramuscular injections help in the treatment of the following diseases and conditions: - muscle cramps; - polydiabetic neuropathy; - toxic destruction of nervous tissue by alcohol. The medicines in question in liquid form are also used for cosmetic purposes. They are added to shampoos and balms to improve the effectiveness of exposure to such funds. When mixed with natural ingredients and various oils, B vitamins are used for the face, which contributes to the rejuvenation of the skin, an overall improvement in their condition. The use of liquid vitamins as therapeutic or cosmetic means is recommended to be agreed with specialists in order to avoid negative consequences. Vitamin B ampoules: drug names In pharmacies, a wide selection of medicines containing B vitamins is presented. Ampoules may contain individual elements or their combinations. Among the presented assortment there are American and foreign medications. Among the combined, containing several vitamins – B1, 6, 12, American drugs, the following can be distinguished: Among the foreign combined products, the following are most known: - Beviplex – B1, 2, 3, 5, 6, 12. Among unicomponent medicines in ampoules, for which these B vitamins are used, it will be considered later, the most popular are: - Thiamine – B1; - Pantothenic acid – B5; - Pyridoxine – B6; - Cyanocobalamin – B12. Vitamin B in ampoules: instructions for use To get the maximum benefit from vitamin B in ampoules, you need to not only know what it is used for, but also how to use it correctly. Doctors recommend that you follow these dosages to avoid hypervitaminosis. Vitamin B1 in ampoules: instructions for use Vitamin B1 is water soluble, it is prescribed in the following cases: - excess and deficiency of this vitamin; - when on probe feeding; - thermal damage; - various poisonings; - neuralgia and psychosis; - neuritis and polyneuritis; - gastrointestinal problems, constipation; - skin diseases (eczema, psoriasis, dermatitis, lichen planus); - long-term overstrain in physical and psychological terms; - while waiting for the baby and feeding the baby; - to maintain diets. he vitamin in question is administered intravenously and intramuscularly. The dosage is prescribed individually, the instruction provides the following recommendations: - for women 5 mg, during the period of bearing a child 9 mg, during lactation 10 mg; - for men, 1 mg; - for the elderly 3 mg. For preventive purposes, you can use the medication inside 5-10 mg, while the daily norm should not exceed 50 mg. Vitamin B6 in ampoules: how to apply Doctors recommend vitamin B6 for the following pathologies: - excess and deficiency of this vitamin (malnutrition, protracted infections, gastrointestinal upset, enteritis); - after removal of the stomach and large parts of the intestine; - neuritis and neuralgia; - dermatitis, psoriasis, diathesis. The agent in question is administered intramuscularly or intravenously. The amount of medication is determined by the disease. Usually prescribed at 100-200 mg / day, the course of therapy reaches 25 days. If necessary, the injections are repeated after 2-3 months. Vitamin B5 in ampoules: how to apply Vitamin B5 is usually prescribed in the following cases: - failure of metabolic processes and blood circulation; - allergic reactions and skin diseases; - bronchitis and bronchial asthma; - chronic liver disease and pancreatitis; - violations of the digestive tract; Often, the drug in question is prescribed to expectant mothers with severe toxicosis. Vitamin B5 in ampoules is prescribed for oral administration, for administration intramuscularly or intravenously. The usual amount of medication for adults is 0.1-0.2 g 2-4 times a day, for babies (up to 3 years) – up to 0.1 g, under the age of 14 years – up to 0.2 g 2 times a day. For skin ailments, it is recommended that adults up to 1.5 g of vitamin A, children up to 0.3 g 2-3 times a day. Vitamin B12 in ampoules: instructions for use Doctors include cyanocobalamin in the treatment of the following ailments: - anemia (iron deficiency, posthemorrhagic, etc.); - hepatitis and other liver pathologies; - neuralgia and sciatica; - various diseases of the skin. Also, vitamin B12 is prescribed for alcoholism, as a maintenance therapy for diets. The agent in question can be used orally, intravenously, intramuscularly and subcutaneously. Dosage is selected in accordance with the disease. In neurological conditions, 200-400 mcg is prescribed 2-4 times per month. To maintain the liver – 30-60 mcg / day. With anemia – 30-100 mcg 2-3 times a week. To eliminate vitamin deficiency, injections of 1 mg every day, the duration of therapy is 1-2 weeks. As a preventive effect, B12 is administered at 1 mcg once a month. Do not miss the most popular heading: Hyaluronic acid in tablets. Benefits, how to take, reviews of doctors and effectiveness. Vitamins B in ampoules for hair: instructions for use Vitamins of group B in ampoules are able to positively affect the hair, for which they are used as part of various masks. It is also recommended to add a few drops of the product in shampoos or balms. You can apply the medication in a small amount in pure form to washed hair. Hair mask with vitamins in ampoules - Vegetable and vitamin mask. Thiamine, cyanocobalamin, A, E (1 ampoule each), nettle, chamomile and linden flowers, 1 large tablespoons, a little crumb of rye flour. Herbal collection pour 1 tablespoon. boiling water, insist 30 minutes. Separate the infusion from plants, put crumb
1.222578
m-a-p/FineFineWeb
Quora Quora . This question originally appeared on Quora. Answer by James Porter. First and foremost, anxiety is a disorder. It's a condition that can be diagnosed, based on a collection of symptoms like the ones listed below (From WebMD). It's ongoing. Stress and nervousness are not diagnosed and tend to be more short-lived. The definition of stress only adds to the confusion here because half the world considers stress to be what happens to you like traffic jams, arguments and deadlines and the other half thinks of it as how you feel inside when you encounter things like this. Nervousness is something you feel temporarily, like before a job interview, or getting up to give a speech or trying something new like skiing for the first time. Nervousness usually goes away after a while, stress comes and goes almost randomly in response to various experiences, and anxiety is something you feel on an ongoing basis (not necessarily in response to any particular experience). I heard Frank Sinatra say to Larry King that he got nervous every time he walked out on stage, but he said that nervousness would always go away within a few minutes. Carly Simon famously quit doing live concerts and Carol King had to get help with her anxiety before she could return to the stage. So, just to be crystal clear: Frank suffered from nervousness and Carly and Carol had anxiety. For all three performers, the idea of getting up in front of thousands of people is going to be stressful. Having pointed out the differences between anxiety, nervousness and stress, it may surprise you that these three different conditions are all created in the exact same place in the body. It happens when the Hypothalamic, Pituitary, Adrenal (HPA) axis is activated that you feel anxious, nervous or stressed. With anxiety, it's probably fair to say that you have a malfunctioning HPA axis (it's switched on much or all of the time) With stress, if the HPA axis is switched on when you hear a loud crash in the middle of the night, that's good! You want to be on high alert in case there is an intruder in the house. There's more of a direct cause and effect relationship when we are talking about what causes our stress symptoms. If the HPA axis is switched on when you are first learning to drive, or to ski or to rock-climb that's good too. Your nervousness causes you to be extra careful in these situations. So here we see that nervousness comes on when we try something new or challenging but goes away when we get accustomed to it, stress comes and goes as challenges arise in our lives (almost randomly) and anxiety, tends to stick around and is a condition that needs to be treated. Stanford Professor, Dr. Robert Sapolsky, who wrote the book: Why Zebras don't Get Ulcers, likes to say that Zebras don't get ulcers (a condition that can be caused by chronic stress) because they don't think about the lion when the lion's not there. We human beings (with our large imaginative brains) can and DO think about the lion when the lion is not there. (Your lion could be anything you worry about excessively.) If you have an anxiety disorder you are very likely to worry about all sorts of things that pose no real danger. What Are the Symptoms of Anxiety Disorders? (From Web MD) It depends on the type of anxiety disorder, but general symptoms include: - Feelings of panic, fear, and uneasiness - Problems sleeping - Cold or sweaty hands or feet - Shortness of breath - Heart palpitations - Not being able to be still and calm - Dry mouth - Numbness or tingling in the hands or feet - Nausea - Muscle tension - Dizziness More from Quora:
1.225492
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
eso0834 — Photo Release Born from the Wind Unique Multi-wavelength Portrait of Star Birth 8 October 2008 Telescopes on the ground and in space have teamed up to compose a colourful image that offers a fresh look at the history of the star-studded region NGC 346. This new, ethereal portrait, in which different wavelengths of light swirl together like watercolours, reveals new information about how stars form. The picture combines infrared, visible and X-ray light from NASA's Spitzer Space Telescope, ESO's New Technology Telescope (NTT) and the European Space Agency's XMM-Newton orbiting X-ray telescope, respectively. The NTT visible-light images allowed astronomers to uncover glowing gas in the region and the multi-wavelength image reveals new insights that appear only thanks to this unusual combination of information. NGC 346 is the brightest star-forming region in the Small Magellanic Cloud, an irregular dwarf galaxy that orbits the Milky Way at a distance of 210 000 light-years. "NGC 346 is a real astronomical zoo," says Dimitrios Gouliermis of the Max Planck Institute for Astronomy in Heidelberg, Germany, and lead author of the paper describing the observations. "When we combined data at various wavelengths, we were able to tease apart what's going on in different parts of this intriguing region." Small stars are scattered throughout the NGC 346 region, while massive stars populate its centre. These massive stars and most of the small ones formed at the same time out of one dense cloud, while other less massive stars were created later through a process called "triggered star formation". Intense radiation from the massive stars ate away at the surrounding dusty cloud, triggering gas to expand and create shock waves that compressed nearby cold dust and gas into new stars. The red-orange filaments surrounding the centre of the image show where this process has occurred. But another set of younger low-mass stars in the region, seen as a pinkish blob at the top of the image, couldn't be explained by this mechanism. "We were particularly interested to know what caused this seemingly isolated group of stars to form," says Gouliermis. By combining multi-wavelength data of NGC 346, Gouliermis and his team were able to pinpoint the trigger as a very massive star that blasted apart in a supernova explosion about 50 000 years ago. Fierce winds from the massive dying star, and not radiation, pushed gas and dust together, compressing it into new stars, bringing the isolated young stars into existence. While the remains of this massive star cannot be seen in the image, a bubble created when it exploded can be seen near the large, white spot with a blue halo at the upper left (this white spot is actually a collection of three stars). The finding demonstrates that both windand radiation-induced triggered star formation are at play in the same cloud. According to Gouliermis, "the result shows us that star formation is a far more complicated process than we used to think, comprising different competitive or collaborative mechanisms." The analysis was only possible thanks to the combination of information obtained through very different techniques and equipments. It reveals the power of such collaborations and the synergy between groundand space-based observatories. D. Gouliermis et al., NGC 346 in the Small Magellanic Cloud. IV. Triggered Star Formation in the H II Region N 66, to appear in the Astrophysical Journal Other authors of this paper include Thomas Henning, Wolfgang Brandner, Eva Hennekemper, and Felix Hormuth of the Max Planck Institute for Astronomy, and You-Hua Chu and Robert Gruendl of the University of Illinois at Urbana-Champaign, USA. The ESO 3.5-m New Technology Telescope (NTT), located at La Silla in Chile, was the first in the world to have a computer-controlled deformable main mirror (active optics), a technology developed at ESO and now applied to most of the world's current large telescopes. Max Planck Institute for Astronomy
2.270916
HuggingFaceFW/fineweb-edu
Style has devoted a special issue (Volume 48/1) to recent pedagogical work by Peter J. Rabinowitz and Corinne Bancroft '10. Rabinowitz is the Carolyn C. and David M. Ellis '38 Distinguished Teaching Professor of Comparative Literature. The issue begins with Rabinowitz and Bancroft's "Euclid at the Core: Recentering Literary Education." In their article, which addresses teaching literature in secondary schools, they reject the Common Core Standards in part on the grounds that "they have no significant theoretical grounding." As an alternative, Rabinowitz and Bancroft propose a new curricular framework grounded in rhetorical narrative theory and cognitive narrative theory (especially the work of Lisa Zunshine). Their title comes from the Euclidean principles behind their model, which starts with a few basic postulates and uses them used to build increasingly complex types of literary knowledge and experience. Their proposals also build heavily on the importance of "kid knowledge"—knowledge that students already possess before they come to class. The resulting curricular program avoids the major problems with both traditional text-centered instruction education (such as the Common Core) and more subjective reader-centered models. "Euclid at the Core" is followed by 11 responses by high school teachers, education theorists, and literary theorists. The issue concludes with a second essay by Bancroft and Rabinowitz, "'Thanks to All at Once and to Each One': Continuing the Conversation," which responds to those 11 essays and further develops the arguments in "Euclid at the Core."
2.237274
openbmb/Ultra-FineWeb
who subsequently develop BPD are significantly lower than those without BPD. [55] G protein-coupled receptor 124 (GPR124) is thought to play a role in regulating sprouting, migration, and developmental expression of the blood-brain barrier and is also expressed in embryonic epithelium of lung. [56] Cadherin 13 (CDH13), an atypical glycosylphosphatidylinositol (GPI)-anchored member of the cadherin superfamily widely expressed in the cardiovascular system, is involved in tumor angiogenesis and promotes proliferation in vascular cells and angiogenesis via activation of the PI3K/Akt/mTOR signaling pathway when overexpressed and ligated. [57], [58], [59], [60] Notch signaling was downregulated in the GSA, which is thought to play a primary role in selection of Clara cell fate and arterial vascular smooth muscle cell recruitment [61], [62], [63]; Notch signaling also negatively regulates vascular endothelial growth factor (VEGF)-induced angiogenesis and is thought to suppress aberrant vascular branching morphogenesis. [64] Our data also demonstrated a significant downregulation of genes in the GBS group associated with regulation of nitric oxide synthase (NOS). In the preterm lamb lung, antenatal exposure to intra-amniotic endotoxin is associated with decreased postnatal endothelial NOS (eNOS) expression measured at 2–4 days of age followed by vascular remodeling changes in small pulmonary arteries demonstrated by medial smooth muscle hypertrophy and increased adventitial fibrosis. [65]. The strength of our study lies in the similarities in lung development and immune function between the nonhuman primate and human neonate. Pulmonary morphologic and immune features in our model also emulate that in humans, but differ from many other species. [66] Both humans and nonhuman primates lack pulmonary intravascular macrophages present in the lungs of many species (e.g. sheep, cattle, pigs) which tend to concentrate toxins and bacteria in the lungs. In contrast, humans and nonhuman primates localize bacteria and toxins in the liver and spleen, which makes their lungs less susceptible to injury than other species. [65], [67] There are also many similarities to human pregnancy including a singleton fetus with a long gestational period, hemomonochorial placentation, and sensitivity to pathogens (e.g. lipopolysaccharide). Maternal-fetal inflammatory responses induced by infection and parturition also emulate that in humans, but differ significantly in other animal models. Many mammalian models in which lung development has been studied (e.g. sheep) are also in the alveolar stage of lung development, which is more advanced at the time of a preterm birth than in human preterm neonates (saccular) who go on to develop BPD. The elevated AF cytokine levels despite negative AF culture results seen in our model also appears to replicate the clinical condition in humans seen in up to 25% of preterm labor cases with elevated amniotic fluid IL-6 and a negative culture and/or PCR. [68], [69], [70] Therefore, our model may reflect a common biological event of pro-inflammatory cytokine signaling induced by many different pathogens in the choriodecidual space and is not restricted specifically to GBS. A limitation of our study is the lack of lung morphometry, but the time course from infection to delivery was fairly short (4 days) and differences may not yet have become apparent. Lung injury in this model was originally unexpected and the fetal lung was not preserved in such a way to accurately measure lung morphometry later. Another limitation, as well as study strength, is that our results reflect an early or limited choriodecidual infection. We may have interrupted pathways leading to further fetal lung injury, maturation, or possibly repair with further time in utero. The acute histologic changes seen in the GBS exposed animals lungs, including accumulation of inflammatory cells, interstitial wall tissue thickening, and fibrin exudation or hemorrhage, may be precursor findings that subsequently develop into the histopathologic findings of alveolar simplification and enlargement characteristic of the new BPD after premature infants are exposed to mechanical ventilation, hyperoxia, and/or sepsis. [71] The risk for developing BPD in association with histologic chorioamnionitis increases in infants who are exposed to mechanical ventilation postnatally. [72] Since our model focused on early in utero time points, it is not known if the histopathologic findings in the GBS exposed animals would eventually develop BPD-like features if exposed to other postnatal insults associated with ventilation; however, our gene expression findings suggest this possibility. Therefore, future studies in our model are needed to determine if the fetal lung injury associated with elevated AF pro-inflammatory cytokines requires subsequent postnatal injury (e.g., mechanical ventilation or sepsis) for BPD to develop. The timing, degree, and duration of exposures and events producing lung injury in utero and ex utero may influence the ultimate pulmonary phenotype of preterm infants at risk for BPD. Our sample size is also modest, which is typical of nonhuman primate studies and necessary for ethical reasons and conservation. Finally, not all the probe sets on the Affymetrix chip are annotated and some differentially regulated genes could not be identified. The microarray analysis reported in this study measured expression of thousands of genes in a limited number of biological replicates. A concern with this experimental design is a Type I ("false positive") or Type II ("false negative") error when assessing the statistical significance of expression changes of single genes. We minimized this concern with the following strategies. First, the samples that were used for microarray analysis were carefully phenotyped, i.e. lung injury was defined as an aggregate of histologic changes including accumulation of inflammatory cells, evidence of necrosis, inflammatory related tissue thickening, collapse or other injury such as fibrin exudation or hemorrhage. We also used a 1.5-fold expression change criteria in addition to a p-value cut-off (p<0.05) to define differential gene expression. By using a combination of a fold-change and p-value criteria, Type I and II errors are decreased. In addition to carrying out single gene analysis, we also carried out Gene Set Analysis and Ingenuity Pathway Analysis. Both of these methods assess the statistical significance of pre-defined sets of genes/pathways as a whole, rather than single genes. Therefore, these methods are less prone to Type I or II errors derived from single genes. Finally, we validated a subset of genes that microarray analysis identified as differentially expressed with quantitative RT-PCR analysis and found a 94% agreement between these two independent methods. Given that it is cost-prohibitive to increase the number of animals (biological replicates) in this study, the aforementioned approaches minimize Type I and II errors as much as it is practically possible. Our work confirms many of the pathways reported in later stages of lung development from ventilated preterm neonates [4], [40], [73], [74] and alveolar stage models of fetal lung injury. [47], [65], [75], [76] Our study extends this work with the first comprehensive genomic analysis of early in utero lung injury in the saccular stage of lung development. Molecular pathways reveal a significant disruption in angiogenesis and morphogenesis with upregulation of both innate and adaptive immune pathways. The finding that significant fetal lung injury occurred silently before preterm labor is also novel and quite sobering for the development of preventive strategies. Our data suggest that molecular pathways leading to BPD may originate in utero and precede delivery by several days or longer before a clinically recognizable event like preterm labor. Future studies to analyze changes in the fetal lung proteome and microRNAs will be important to complement this work in understanding the pathogenesis of in utero fetal lung injury. The nonhuman primate may be uniquely suited for the future study of therapies during pregnancy to limit in utero lung injury and prevent the resulting aberrant lung development. Materials and Methods Ethics Statement This study was carried out in strict accordance with the recommendations in the Guide for the Care and Use of Laboratory Animals of the National Research Council and the Weatherall report, "The use of non-human primates in research". The protocol was approved by the Institutional Animal Care Use Committee of the University of Washington (Permit Number: 4165-01). All surgery was performed under general anesthesia and all efforts were made to minimize suffering. Animals and Study Groups Ten chronically catheterized pregnant monkeys (Macaca nemestrina) at 118–125 days gestation (term = 172 days) received one of two experimental treatments: 1) choriodecidual and intra-amniotic saline infusions (n = 5), or 2) GBS choriodecidual inoculation (n = 5). In two saline controls, fetal samples were not collected due to either an inability to place the fetal catheter during initial surgery or clotting of the fetal catheter. This resulted in three fetal cytokine analyses in the saline group. In one GBS case, technical problems led to only intermittent data collection and so the remaining uterine activity data was excluded for this animal. The cytokine analyses were previously published and are presented to give context to the genomics analyses. [77]. In our model, pregnant pigtail macaques were time-mated and fetal age determined using early ultrasound. Temperature in the animal quarters was maintained at 72–82 degrees Fahrenheit. Animals were fed a
1.840393
Zyphra/Zyda-2
Aging is part of the natural human condition. While all of us will experience wrinkles, there are a few factors such as genetics and lifestyle choices that can affect just how many or when we begin to see them show on our skin. Establishing a proper skincare routine, whether you are a man or a woman, can go a long way in showing long term benefits when it comes to skin health. Caring for your skin is not just about beauty and aesthetics, as skin cancer and other issues can affect all genders alike. The following are some of the most important steps you can start taking today in order to maintain healthy skin for a long time and age gracefully with a reduced risk of skin disease. - Use sunscreen: Always remember this rule, sun exposure can cause sunburn and skin cancer. Remembering to wear sunscreen whenever you go to the beach or spend days at the park is important, but applying sunscreen day to day is also necessary. A helpful tip is to keep your sunscreen near your toothbrush so you can easily develop this habit. - Cover up: In addition to wearing sunscreen, remember to wear protective clothing if you will be out all day and to stay in an area with shade whenever possible. - Stay hydrated: Drinking plenty of water throughout the day, every day, will keep your skin looking hydrated and supple. - Eat healthily: Eating healthy is beneficial to your overall health, but when it comes to skin, eating plenty of fruits and veggies full of antioxidants can help keep your skin glowing, clear, and young. - Quit smoking: Smoking affects the production of collagen and elastin, the proteins that keep your skin looking young. It also decreases blood flow to the skin and increases the risk of certain types of cancer, so it's best to avoid smoking and to find help in order to quit as soon as possible. - Establish a skin care routine: Establishing a routine that fits your skin type, and actually sticking to it regularly, can have long term benefits for your skin's health. - Relax: Stress can have a huge impact on your skin by causing premature wrinkles. Try to keep stress at bay by practicing relaxation techniques and both your skin and your mental health will reap the benefits!
2.010005
openbmb/Ultra-FineWeb
Literature Reviews Welcome to Joyner Library's Chemistry research guide. Example of a Literature Review The following literature review presents the first part of a fairly extensive report on the history, chemical syntheses, and uses of the chemical compound cantharidin. Notice how the forecasting statement that opens the introduction provides the reader with an effective road map of the entire paper. Literature Review - Honors 450 Chemistry & Engineering. By selecting from the tabs above, you can access many of the resources available here at the library. Honors 450 Chemistry & Engineering. This guide brings together WVU Libraries resources for Honors 450. Getting Started · Books & eBooks. Writing a Literature Review - Kirsop Labs Many of these resources are available electronically, though not all. How to structure your literature review Your review should consist of an Abstract if asked for one, Introduction, Main Body and Conclusion. Make sure that the Introduction contains any definitions and a short history of the subject area, leading into a statement of what the review is intended to cover. Literature Reviews - MIT This guide should: Information Competencies for Chemistry Undergraduates: This document has a list of information competencies for Chemistry students. A literature review may be a self-contained document, or it may be a section of a. history, chemical syntheses, and uses of the chemical compound cantharidin. Chemistry The Literary Review It covers chemical literature, spectra and properties information, and scientific communication. She has published poems in Electric Literature, Gramma, The West Wind Review, Abraham Lincoln, and the Pacifica Literary Review. Read her poem here. Mary Donnelly's poetry has appeared in The Brooklyn Rail, Hunger Mountain, The Iowa Review, Indiana Review, Prairie Schooner, and The Yale Review.
1.867993
openbmb/Ultra-FineWeb
Yogic Path Stop Feeling Hungry (Hangry) & Guilty With These 12 Yogic Eating & Mindfulness Tips Updated on 30 April 2020 • 6 minute read "If you pay attention to when you are hungry, what your body wants, what you are eating, and when you've had enough, you end the obsession because obsession and awareness cannot coexist." – Geneen Roth, author Constant hunger (or even hanger) even after you've eaten may be a sign that something is off with your hormonal health and metabolism. It may also have to do with your food choices and eating habits. Or there might be an underlying mental-emotional component to the physical sensations. It can be frustrating to feel like you can't control your hunger, so what can you do to rebalance your body's satiety response? Here are 12 proven tips based on the yogic approach to eating, Buddhist mindfulness principles, and functional nutrition… 1- Mindful Eating (Intuitive Eating) Mindful eating is based on the Buddhist practice of mindfulness – paying attention in a particular way to what is happening in the present moment without having to change it or judge it. Over time and with constant practice, mindful eating can also be considered intuitive eating or healthy eating because we become very present and attuned to the eating experience and our senses. We are able to connect to our bodies and psyche in a deeper way, so we can better listen to our bodies' cues for hunger, fullness, and whatever cravings come about. Mindful eating practices such as eating slowly and being present to the sensation of when you chew can help to reduce overeating and endless dieting. It can also help you make better food choices which can increase feelings of fullness. Try to engage all of your senses and offer up your full attention during your next meal and see how you go. 2- Self-Inquiry (Svadhyaya) Svadhyaya is the yogic principle of self-study, self-inquiry, self-awareness, and introspection. You can apply this principle to your eating habits by simply observing yourself in relationship to food. Self-inquiry is related to mindfulness so both go hand in hand. Pay attention to your mental/emotional state before eating. Bring awareness to your food choices. Notice how you eat. Notice what you crave. Ask yourself questions to uncover if there are any underlying emotional triggers. Become aware of your body's hunger cues and feelings of fullness. What do the hunger pangs feel like? Your body will tell you when it's a physical hunger pang or an emotional hunger pang that's requiring your attention. What does fullness feel like in your body? Your body is wise and intelligent so learn to listen to it and trust it. 3- Non-greediness (Aparigraha) Aparigraha is the yogic principle of non-greediness and non-attachment. Aparigraha helps us transform a 'lack mentality' and fears of not having enough. This is what leads to compulsive behaviors and cravings. According to yogic philosophy, compulsive craving is one of the five afflictions and obstacles (kleshas) to ascending to higher levels of awareness and consciousness. These afflictions are the source of pain and suffering. In Buddhism, this is referred to as our 'hungry ghosts.' Psychologist and Buddhist teacher Tara Brach explains it like this: "The hungry ghost figures are depicted with scrawny little necks and huge bellies — riddled with powerful desires they can never really satisfy… Not only are we caught in the pain of craving, but we are also condemning ourselves for it. When we are stuck in this craving, shame, and addictive looping, we cannot be present for our moments. Always wanting something different, we miss out on the life that is right here." (1) (source: Uncanny Japan Podcast) Watch your hungry ghosts during meal times and when you're portioning. Observe without judgment and slowly whatever lack mentality you have towards food can transform into contentment and gratitude… 4- Contentment (Santosha) (source: meme candy via giphy) Santosha is the yogic practice of contentment. This is what can transform hungry ghosts and lack mentality into "enoughness" and a sense of inner confidence and sufficiency. One unique way to practice Santosha in terms of our nutrition is by adopting the Japanese habit of Hara Hachi Bu. Hara Hachi Bu means stop eating when you're 80% full. In the West, we tend to stop eating when we're full, but in Japan, the custom is to stop eating when you're no longer hungry. By eating when you're no longer hungry you're training your body to seek contentment and not excess. Plus, this means you'll ingest fewer calories which trains your digestive system to reset and subsist on less without feeling intense hunger. 5- Drink a 400 ml glass of water 30 minutes before your meals (Saucha) Saucha is the yogic principle of cleanliness and purity. Water is the universal element that represents both. 60% of the human body is made up of water, and yet, most of us simply don't drink enough water on a daily basis. A chronic state of dehydration, even if it's mild, can create symptoms that mimic hunger pangs. This means you may "feel" hungry but really be thirsty. According to recent studies, it's estimated that 37% of people mistake hunger for thirst. (2) Make it a habit to drink a glass of water 30 minutes before each meal and consume at least 1/5-2 liters of water daily. 6- Get your beauty sleep (Yoga Nidra) Not getting enough sleep will mess with your hunger hormones and cause you to be hungrier and eat more. One study found that just one single night of sleep deprivation causes an increase in levels of the hunger hormone ghrelin, as well as a decrease in the fullness hormone leptin. (3) A single night of poor sleep also causes blood sugar imbalances and insulin sensitivity, which can make you crave rich foods and gain weight more easily. (4) If you have trouble going to sleep or staying asleep the practice of Yoga Nidra (yogic sleep) can help activate your nervous system's relaxation response so you can recover. (5) 7- Load up on fiber Fiber is filling and isn't easily broken down so it helps slow digestion down. Studies have found that high-fiber diets can have an appetite suppressant effect. (6) Be sure to fill up 65-75% of your plate with a wide range of veggies, nuts, and seeds to get your daily dose of fiber. 8- Reduce your carb intake (source: Fuller House via Giphy) A high-carb diet is one of the worse culprits for chronic hunger because carbs are digested quickly and don't offer much nutritional density. This is especially true if you're consuming processed carbs like bread, crackers, or cereal. If you want to feel full for longer, and want to ditch the energy crash accompanied by eating carbs then drastically reduce your consumption. Opt for unprocessed carbs that offer more nutritional value such as root vegetables and squashes to control hunger. 9- Ditch "low-fat" for "high-fat" One of the best ways to curb hunger is to increase your consumption of high-quality fats such as avocado (also high fiber so double whammy), olive oil, coconut oil, egg yolks, salmon, salmon roe, avocado oil, MCT (medium-chain triglyceride) oil, hemps seeds, chia seeds, and tahini. These foods can feel indulgent and satisfying while also being extremely nourishing and healthy dense foods. A study review found that people can last longer periods of hunger and feel more satiated when they consume a high-fat, low-carb diet. (7) 10- Go high-protein A high-protein, high-fat diet is a winning combo if you want to feel full and stay full for longer and support your weight loss efforts. Loading up on high-quality protein such as collagen peptides, wild-caught low mercury fish like salmon and sardines, organic free-range chicken, or grass-fed beef can help you avoid overeating or eating things that won't satiate you. It can also help to keep blood sugar balanced and food cravings at bay. 11- Try intermittent fasting (time-restricted eating) A new study published in the Obesity journal found that time-restricted eating can help to reduce appetite. (8) Researchers found that eating within a six-hour window (from 8 am – 2 pm) resulted in subjects having decreased ghrelin levels (the hunger hormone), more balanced hunger levels, increased fullness, and a decreased desire to eat. "We suspect that a majority of people may find meal timing strategies helpful for losing weight or to maintain their weight since these strategies naturally appear to curb appetite, which may help people eat less," says lead study researcher Courtney Peterson, professor at the University of Alabama. There are many different time windows and ways to practice intermittent fasting. You can start with a wider window and reduce it to less as your body becomes accustomed to the new schedule. To start you can try a 14-hour window where you stop eating and snacking
1.81032
Zyphra/Zyda-2
Words by Kayla Burns Art by Austin Quintana and Kayla Burns It is an annual change for all deciduous trees. As the weather grows colder, and the season morphs from autumn to winter, we witness one final show in the botanical world. With colder weather comes less sunlight, and with less sunlight comes the inability for plants to photosynthesize. Naturally, the chlorophyll in the leaves fades away, revealing the warm hues of the fall season. The world unfolds itself in bursts of red and yellow and orange. And although this transition means that these trees will soon become bare, leafless, and dormant, there is still life in these colors. They are changing because they are preparing — soaking up as much sunlight as they can, so that they may store its energy and survive the winter. The trees may lose their vibrant green coloration, but they gain a certain vitality that will get them through the cold, and allow them to prosper yet again as they reconnect in the springtime with the warmth that birthed them.
2.092342
openbmb/Ultra-FineWeb
Exercise - List connections in a tenant In this exercise, you will connect to Power Apps and Power Automate PowerShell cmdlets to list all connections that are in your tenant. You can use this information to determine which users are making connections through different connectors. 1. Launch Windows PowerShell and select Run as Administrator. Run as Administrator 2. Import the required modules by using the following commands: Install-Module -Name Microsoft.PowerApps.Administration.PowerShell Install-Module -Name Microsoft.PowerApps.PowerShell-AllowClobber 3. If you are prompted to accept the change to the InstallationPolicy value of the repository, accept this change for all modules by entering A and then pressing Enter for each module. 4. List all connections by using the Get-AdminPowerAppConnection command. 5. At this point, you should be prompted for credentials. Enter your credentials while accounting for the prerequisites that were discussed at the beginning of this module. 6. After you have entered your credentials, the cmdlet will run and all of the connections will be returned. Data that is returned includes the name of the connector, who created the connection, the environment, and its current status. Returned data
1.377617
Zyphra/Zyda-2
Background: The analysis of large-scale data sets via clustering techniques is utilized in a number of applications. Biclustering in particular has emerged as an important problem in the analysis of gene expression data since genes may only jointly respond over a subset of conditions. Biclustering algorithms also have important applications in sample classification where, for instance, tissue samples can be classified as cancerous or normal. Many of the methods for biclustering, and clustering algorithms in general, utilize simplified models or heuristic strategies for identifying the "best" grouping of elements according to some metric and cluster definition and thus result in suboptimal clusters. Results: In this article, we present a rigorous approach to biclustering, OREO, which is based on the Optimal RE-Ordering of the rows and columns of a data matrix so as to globally minimize the dissimilarity metric. The physical permutations of the rows and columns of the data matrix can be modeled as either a network flow problem or a traveling salesman problem. Cluster boundaries in one dimension are used to partition and re-order the other dimensions of the corresponding submatrices to generate biclusters. The performance of OREO is tested on (a) metabolite concentration data, (b) an image reconstruction matrix, (c) synthetic data with implanted biclusters, and gene expression data for (d) colon cancer data, (e) breast cancer data, as well as (f) yeast segregant data to validate the ability of the proposed method and compare it to existing biclustering and clustering methods. Conclusion: We demonstrate that this rigorous global optimization method for biclustering produces clusters with more insightful groupings of similar entities, such as genes or metabolites sharing common functions, than other clustering and biclustering algorithms and can reconstruct underlying fundamental patterns in the data for several distinct sets of data matrices arising in important biological applications. All Science Journal Classification (ASJC) codes - Structural Biology - Molecular Biology - Computer Science Applications - Applied Mathematics
1.839398
openbmb/Ultra-FineWeb
The Fast Diet The Fast Diet Michael Mosley and Mimi Spencer The Fast Diet is the first intermittent fasting book I read in my life after a few months of me experimenting with intermittent fasting. It covers the benefits of intermittent fasting backed by research and case studies, shows you how to do it with the 5:2 method. And finally comes with a huge list of recipes and case studies by people who practice the same type of intermittent fasting. My Highlights In intermittent fasting, there are not complicated rules to follow; the strategy us flexible, comprehensible and user-friendly. You'll still enjoy the foods you love, most of the time. It is much more a diet remedy, it is a sustainable strategy for a healthy, long life. It's hard to convince others to eat less and skip meals, but the truth is, our remote ancestors did not often eat four to five meals a day. Instead, they would kill, gorge, lie around and then have to go for long periods of time without food. Our bodies and genes were forged in an environment of scarcity, punctuated by the occasional massive blow-out. The idea that eating little and often is a 'good thing' has partly been driven by snack manufacturers and faddish diet books. But it has also had support from the medical establishment, as long as you don't simply end up eating more. Unfortunately, in today's real work that's exactly what happens. Intermittent fasting helps to reduce a hormone called IGF-1 that has growth-promoting effects on almost every cell in your body. It keeps your cells constantly active. You need adequate levels of IGF-1 when you are young and growing, but high levels later in life appear to lead to accelerated aging and cancer. A reduction of IGF-1 means that you're reducing your risk of a number of age-related diseases. During the fasted phrase in intermittent fasting, instead of expending energy on growth and sex, your body spends its precious store of energy on repair. The result is that all the little gene mechanics are ordered to start doing some of the urgent maintenance tasks that have been put off till now. Your body is stuck in the fat-storing mode as your insulin levels are elevated due to the fact that you're eating all the time. With a few hours of fasting, your body able to turn off the 'fat storing' and turn on the 'fat burning' mechanism, that's how intermittent fasting helps in weight loss, and lower the risk of obesity-related diseases. The trouble with constantly eating lots of sugary, carbohydrate-rich foods and drinks, as we increasingly do, is that this requires the release of more and more insulin to deal with the glucose surge. Up to a point, your pancreas will cope by simply pumping out even larger quantities of insulin. This leads to greater fat deposition and also increase the risk of cancer. Intermittent fasting leads to an overall enhancement in your mood and sense of wellbeing. This may be a consequence of your brain producing increased levels of the neurotrophic factor, which will hopefully make you more cheerful, which in term should make fasting more doable. More Book Notes The Hour between Dog and Wolf Do The Work Rich Dad Poor Dad Master Your Week to Master Your Life Thank you! Your submission has been received! Oops! Something went wrong while submitting the form.
1.15945
Zyphra/Zyda-2
develop oral cancer. Also, sporadic cases of oral cancer occur in young adults, non-users of any identifiable carcinogen, and there have been reports of family history involvement23. Today, many genetic events caused by chromosomal alterations or mutations have been proposed to underline the progression of oral tumors38. The development regulatory genes4,11 are an important group of genes involved with carcinogenesis. These genes were never associated with oral cancer. Recently, we were able to show that four distinct squamous cell carcinoma cell lines express HOX genes differently from the control cells and tissue27. Cancer and normal development have a great deal in common, as both processes involve shifts between cell proliferation and differentiation4. Recent research has demonstrated that improper regulation of development genes may result in cancer. However, there is a lot to be learned about the interplay that exists between development, cell cycle, apoptosis and cancer. Many cancers exhibit expression or alteration in homeobox genes. They include leukemia, colon, skin, prostate, breast and ovary cancers, among others. Recently it was shown that loss of expression in human breast cancer of p53, a gene that protects cells against malignant transformation, may be primarily due to lack of expression of HOXA529. However, the precise mechanisms by which homeobox gene alterations lead to cancer are still unknown11. The demonstration of cell lineage-specific patterns of HOX gene activation in human and murine leukemic cell lines supports the hypothesis that HOX gene expression can regulate normal hematopoietic differentiation21. Altered expression of HOX genes located in HOXA and HOXB loci is often involved in leukemogenesis. The infection of normal marrow cells with a LTR/HOXB8 construct, together with the action of the IL-3 gene, was able to induce myeloid leukemia in mice24. A genomic fusion in frame between the nucleoporin gene NUP98 and the HOXA9 gene was shown in three patients with myeloid leukemia and translocation t(7;11)25. Chimeric fusion proteins resulting from the transcription activator domain of one protein and the DNA binding domain of another display a high oncogenic potential. Other fusions, as PBX1 to E2A and HRX to nuclear proteins, alter the sequence-specific binding of HOX genes, direct homeoproteins to a different target, and induce leukemogenesis19. The locus HOXC is mainly implicated in lymphomas. HOXC4, C5 and C6 are ex pressed in non-Hodgkin lymphom s, displaying a type- and site-restricted expression pattern in both T- and B-cell non-Hodgkin lymphomas3. Major differences in HOX gene expression are detectable in primary solid tumors (kidney, colon, breast, prostate and smal cell lung cancer) compared with the corresponding normal adult organs7,20. Misexpression of HOX genes is detectable in metastatic lesions related to the primary tumor of origin and the corresponding normal tissue, supporting the hypothesis of an implication of homeoproteins in cancer evolution10. Overexpression of the homeobox gene HSIX1 in MCF7 cells abrogated the G2 cell cycle checkpoint in response to X-ray irradiation, as it was observed with HOX11. Furthermore, HSIX1, as HOX11, is aberrantly expressed in cancer. Overexpression of HSIX1 is observed in 44% of primary and 90% of metastatic breast lesions, suggesting that HSIX1 may play a role in the progression of breast cancer11. In mammary glands, HOXC6 transcripts, which are active during the puberty and maturity, became silent during pregnancy, probably because of the negative regulation of steroid hormone, and are also inactive in mammary adenocarcinomas12. In other neoplasms, expression of HOX genes was also reported. For instance, renal adenocarcinomas consistently express the HOXA9 gene and only rarely express either HOXD10 or HOXC930. HOXB6, HOXB8 and HOXC9 are misexpressed at various stages of colon cancer evolution37. HOXB7 is silent in normal melanocytes, but became active in melanomas5. In mouse skin, HOXA6, A7 and B7 were identified in papilloma, but not in normal skin6. HOXC6, D1 and D8 are expressed in human neuroblastoma cells8. Finally, in osteosarcomas, HOXC6 expression seems to be regulated by members of the TGF-b superfamily18. CONCLUSIONS A link between development and cancer is expected since both processes involve cell proliferation and cell differentiation. Homeobox genes were first described in organisms in development and are now recognized to be expressed in many types of cancers. The difference between the expression pattern in distinct normal tissues and in tumor tissues must be further characterized in order to all in carcinogenesis. Also, further characterization isences of modulating these genes expression in neoplasms, including oral cancer. ACKNOWLEDGEMENTS The research is funded by Grants 97/13228-5 and 01/13644-6 from FAPESP – Fundação de Amparo à Pesquisa do Estado de São Paulo. REFERENCES 1. Appukuttan B, Sood R, Ott S, Makalowska I, Patel RJ, Wang X, et al. Isolation and characterization of the human homeobox gene HOX D1. Mol Biol Rep 2002;27:95-201. [ Links ] 2. Barber TD, Barber MC, Tomescu O, Barr FG, Ruben S, Friedman TB. Identification of target genes regulated by PAX3 and PAX3 - FKHR in embryogenesis and alveolar rhabdomyosarcoma. Genomics 2002;79:278-84. [ Links ] 3. Bijl JJ, van Oostveen JW, Walboomers JM, Horstman A, van den Brule AJ, Willemze R, et al. HOXC4, HOXC5 and HOXC6 expression in no-Hodgking's lymphoma: preferential expression of the HOXC5 gene in primary cutaneous anaplastic T-cell and oro-gastrointestinal tract mucosa-associated B-cell lymphomas. Blood 1997;90:4116-25. [ Links ] 4. Caldas C, Aparicio S. Cell Memory and cancer – the history of the trithorax and Polycomb group genes. Cancer Metastasis Rev 1999;18:313-29. [ Links ] 5. Care A, Silvani A, Meccia E, Mattia G, Stoppacciaro A, Parmiani G, et al. HOXB7 constitutively activates basic fibroblast growth factor in melanomas. Mol Cell Biol 1996;16:4842-51. [ Links ] 6. Chang PY, Kozono T, Chida K, Kuroki T, Huh N. Differential expression of Hox genes in multistage carcinogenesis of mouse skin. Biochim Biophys Res Commun 1998; 248:749-52. [ Links ] 7. Cillo C, Cantile M, Faiella A, Boncinelli E. Homeobox genes in normal and malignant cells. J Cell Physiol 2001;188:161-9. [ Links ] 8. Cillo C, Faiella A, Cantile M, Boncinelli E. Homeobox genes and cancer. Exp Cell Res 1999;248:1-9. [ Links ] 9. Davideau JL, Demri P, Hotton D, Gu TT, MacDougall M, Sharpe P, et al. Comparative study of MSX-2, DLX-5, and DLX-7 gene expression during early human tooth development. Pediatr Res 1999;46:650-6. [ Links ] 10. De Vita G, Barba P, Odartchenko N, Givel JC, Freschi G, Bucciarelli G, et al.Expression of homeobox-containing genes in primary and metastatic colorectal cancer. Eur J Cancer 1993;29A:887-93. [ Links ] 11. Ford HL. Homeobox genes: a link between development, cell cycle, and cancer. Cell Biol Int1998;22:397-400. [ Links ] 12. Friedmann Y, Daniel CA, Strickland P, Daniel CW, Strickland P. Hox genes in normal and neoplastic mouse mammary gland. Cancer Res 1994;54:5981-5. [ Links ] 13. Gehring WJ, Muller M, Affolter M, Percival-Smith A, Billeter M, Qian YQ, et al. The structure of the homeodomain and its functional implications. Trends Genet 1990;6:323-9. [ Links ] 14. Golpon HA, Geraci MW, Moore MD, Miller HL, Miller GJ, Tuder RM, et al. HOX genes in human lung: altered expression in primary pulmonary hypertension and emphysema. Am J Path
2.536653
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Mobile Analytics Design Assignment 2023 Business Finance 2023 Mobile Analytics Design Assignment Instruction Note You need the following materials to complete this assignment 1 Mobile Analytics Design Assignment Instruction You need the following materials to complete this assignment: 1. An active IBM Cognos Analytics account. 2. Please download WA_HR_Training.csv file from myLeo Online onto your computer. The WA_HR_Training.csv file records information about the costs of HR training courses in a company. The information include in which year a course cost occurs (i.e., the Year column), for which position a course cost occurs (i.e., the Position column), for which department a course cost was spent (i.e., the Department column), etc. Use IBM Cognos Analytics to create a dashboard, and answer the HR manager's following questions: 1. Summarize the Course Cost spent by Year in a bar chart. Sort the chart in a descending order, and answer in which year most course costs were spent. 2. Build a Pie chart to show how Course Cost is spent among Organizations. 3. Use Organization, Department, Position, Internal Hires, External Hires, and Course Cost to build a Driver analysis. What implications can you get from this analysis? Should the manager use one driver or two driver analysis? Which two drivers should be chosen to predict Course Cost? Why? (Hint: You can find Driver analysis under All visualizations when you Change visualization of the chart.) 4. Add a data player controlled by the Year factor, and dynamically show the changes of three charts you created above over the year. (Hint: You can create a data player of Year, and then change the chart type to Data player under All visualizations when you Change visualization of the chart.) What to Submit Create a Word document, and name it as "Mobile Analytics Design Project". In the Word document, please make screen captures of charts for questions 1, 2, 3, and 4. Write your interpretations of the results given by the charts. Question 4 has a dynamic chart. You only need to make a screen capture of your chart at one time sport. Any time spot will work. Please submit the Word document to myLeo Online. Useful Tips for Completing this Assignment 1. Upload data file. You need to upload WA_HR_Training.csv file to Cognos for data analysis. To upload the file, log in your Cognos account. In the lower left corner of the screen, click New, then Upload Files, as shown below. Find the WA_HR_Training.csv file on your computer, and upload it to Cognos. 2. Create dashboard. Once the data file is uploaded, click the three dot icon, then Create dashboard to start the dashboard building. 3. Save dashboard. To save a dashboard, click the save icon in the upper left corner, and then name the dashboard. You can use any name for the dashboard. 4. Link to your dashboard (Optional). To generate a link to your dashboard, click the share icon in the upper right corner. I just want to show you this function. It is not required for this assignment. When you can access to the paid version of Cognos, you will be able to share your system design with your colleagues via the link. We give our students 100% satisfaction for their assignment, which is one of the most important reasons students prefer us from other helpers. Our professional group and planners have more than ten years of rich experience. The only reason that our inception days, we have helped more than 100000 students with their assignments successfully. Our expert's group have more than 2200 professionals of different topics, and that not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment. Place Order Now
1.568487
openbmb/Ultra-FineWeb
connection to their listenership. Importantly, it also enables the hosts to mediate the pornography they watch through an aural-only medium which allows a distance to the visuality of pornographic videos which overwhelmingly relies on the objectification of female bodies. Abstract: As intimacy emerges as a key concept in podcast research, it becomes increasingly urgent to consider the multifaceted ways in which it interacts with the medium. This article advances research on podcasting intimacy by understanding intimacy as undergoing a continual process of culturally contingent negotiation and examining how podcasting participates in that negotiation. Instead of treating intimacy as an inherent part of podcasting, it demonstrates how podcasts can create intimacy and use it to form connections among members of a fan public. To do so, this article uses the first season of Within the Wires (2016) to show how narrative repetition constructs fan-based intimate publics. Within the Wires is an alternate reality fiction podcast whose first season takes the form of relaxation tapes. Throughout the podcast, the narrator repeats specific lines, phrases, and memories that the listener comes to recognize. By retooling Roland Barthes and Marianne Hirsch's work on recognition and community building in photography for use in sound research, this article develops a theoretical framework for understanding the temporalities of recognition in podcasting. Using this framework, the article posits that Within the Wires uses non-narrative repetition alongside its aural aesthetics to create an intimate public through recognition. The podcast extends that recognition into its monetizing paratexts, making it possible for listeners to recognize themselves and others as fans. The first section of this paper defines recognition and its relationship to time, the second considers how recognition works within the show's fandom, the third looks at recognition within Within the Wires' monetizing paratexts, and the final tracks how the podcast finds horror in the breakdown of this system. The article argues that Within the Wires presents intimacy and creates fan-based intimate publics through the experience of recognition. Chase Gregory: Crossing Both Ways: Sarah Jones, The Moth Radio Hour, and the Disruptive Potential of Voice Abstract: This paper examines an episode of popular storytelling podcast The Month, titled "A Walk on the West Side" (2014), in order to explicate and uncover how gender, race, and class might attach to certain voices. In this episode, Jones (a stage performer, writer, and gifted impressionist) first relates her memories of being typecast as black female stereotypes; she then tells the story of being pulled over by LAPD a few days later, under suspicion of sex work. Ultimately, Jones baffles the cops who detain her by affecting a flawless British accent, disrupting their assumptions. Her story—told on the podcast in a myriad of different voices—literally speaks class, race, and gender into being, only to challenge the fixity of these signs, showcasing the simultaneously disruptive and productive potential of speech. Abstract: From a feminist media studies and cultural studies perspective, the contribution explores the fascinating, yet overlooked podcast series Alice Isn't Dead (2016-8). The podcast thematically centers around the complex relationship of culture and distance and develops different understandings of culture, as well as the experience of distance in a geographical, socio-economic (class mobility), or interpersonal-romantic sense. Tracing these conceptions and their attempts to define a collective US-American identity differently, the contribution focuses on the podcast's narration in the form of radio monologues by its protagonist, the exceptional trucker character Keisha, its take on the road trip and (female) mobility, as well as its representation of a queer love story. With an eye for the intersectional effects of gender, race, and sexual orientation, these readings mobilize a variety of cultural artifacts to explore the particular affordances of serialized fictional podcast storytelling. Of particular interest to the contribution are the intertextual echoes of tropes and themes of the road trip narrative and the road movie, as well as the podcast's ending as a turn toward homonormativity that is inconsistent with the queer temporalities and the capitalist critique developed by the podcast during its three seasons. Abstract: In contemporary mainstream media there is a tendency to represent LGBTQ+ characters stereotypically, or even kill them off. This trope is called 'bury your gays' and it has done much to discredit and delegitimise representation. Even though the percentage of queer representation in mainstream media has improved, a viewer could be forgiven for thinking that, overall, popular culture does not think highly of the LGBTQ+ community for continuing to perpetuate these narrative arcs. The McElroy family's popular actual-play podcast The Adventure Zone (TAZ) initially portrayed queer characters in the 'bury your gays' trope by killing off a canon lesbian couple in their first season. As four self-proclaimed 'straight, cis, white dudes', the family initially performed their characters by reflecting what they had seen in mainstream fiction. After engaging with their audience and learning why this was upsetting, they changed the story to reverse the trope; unburying their gays by bringing the characters back to life. Since then, they have consistently introduced more queer characters and, in their latest season, have also introduced nonbinary characters. By tracking the introduction and development of queer representation in TAZ podcast episodes – both the game episodes and the meta-episodes bookending each season – the McElroys' education and integration of this new information into narratives is demonstrable. The representation of queer characters in TAZ shows that podcasts are not just a platform for LGBTQ+ creators to educate their audience; they can also act as a participatory storytelling medium in which creators can be educated in gender and sexuality by their audience. Deniz Zorlu and Nazlı Özkan: Women on Twitch Turkey: Affective Communities and Female Solidarity Under Patriarchy and Postfeminism Abstract: This article examines the experiences of female streamers and podcasters on Twitch Turkey primarily through in-depth interviews conducted with 35 respondents. Despite the platform's growth as one of the most widely visited social media sites and the biggest online game streaming platform, there is limited research as to how gender identities and geographical location shape streamers' experiences and usage of the platform. We argue that female streamer's use of Twitch Turkey is marked by combined patriarchal pressures and neoliberal, postfeminist thrust for aggressive competitiveness. Sexual harassment is the major problem for women, and pervasive patriarchal relations of domination affect all female streamers' usage of the platform, who often find themselves scrutinized and criticized for their body images, clothing, and gaming performances. In exerting control over their behavior, patriarchy, however, affects women in different ways based on their cultural preferences and personal habits. We also argue that Twitch Turkey tends to push women to adopt postfeminist subjectivities to rigorously compete with each other for limited viewership, sponsorship, and income opportunities. However, these pressures and constraints are resisted and re-negotiated especially through the formation of female solidarities and affective communities in online streaming.
1.757921
openbmb/Ultra-FineWeb
whatever ad hoc consultative bodies it deems necessary to carry out its task. 4. The Committee may invite to its meetings any public or private bodies, as well as private persons, with recognized competence in the various fields of the intangible cultural heritage, in order to consult them on specific matters. Article 9 – Accreditation of advisory organizations 1. The Committee shall propose to the General Assembly the accreditation of non-governmental organizations with recognized competence in the field of the intangible cultural heritage to act in an advisory capacity to the Committee. 2. The Committee shall also propose to the General Assembly the criteria for and modalities of such accreditation. Article 10 – The Secretariat 1. The Committee shall be assisted by the UNESCO Secretariat. 2. The Secretariat shall prepare the documentation of the General Assembly and of the Committee, as well as the draft agenda of their meetings, and shall ensure the implementation of their decisions. III. Safeguarding of the intangible cultural heritage at the national level Article 11 – Role of States Parties Each State Party shall: (a) take the necessary measures to ensure the safeguarding of the intangible cultural heritage present in its territory; (b) among the safeguarding measures referred to in Article 2, paragraph 3, identify and define the various elements of the intangible cultural heritage present in its territory, with the participation of communities, groups and relevant non-governmental organizations. Article 12 – Inventories 1. To ensure identification with a view to safeguarding, each State Party shall draw up, in a manner geared to its own situation, one or more inventories of the intangible cultural heritage present in its territory. These inventories shall be regularly updated. 2. When each State Party periodically submits its report to the Committee, in accordance with Article 29, it shall provide relevant information on such inventories. Article 13 – Other measures for safeguarding To ensure the safeguarding, development and promotion of the intangible cultural heritage present in its territory, each State Party shall endeavour to: (a) adopt a general policy aimed at promoting the function of the intangible cultural heritage in society, and at integrating the safeguarding of such heritage into planning programmes; (b) designate or establish one or more competent bodies for the safeguarding of the intangible cultural heritage present in its territory; (c) foster scientific, technical and artistic studies, as well as research methodologies, with a view to effective safeguarding of the intangible cultural heritage, in particular the intangible cultural heritage in danger; (d) adopt appropriate legal, technical, administrative and financial measures aimed at: (i) fostering the creation or strengthening of institutions for training in the management of the intangible cultural heritage and the transmission of such heritage through forums and spaces intended for the performance or expression thereof; (ii) ensuring access to the intangible cultural heritage while respecting customary practices governing access to specific aspects of such heritage; (iii) establishing documentation institutions for the intangible cultural heritage and facilitating access to them. Article 14 – Education, awareness-raising and capacity-building Each State Party shall endeavour, by all appropriate means, to: (a) ensure recognition of, respect for, and enhancement of the intangible cultural heritage in society, in particular through: (i) educational, awareness-raising and information programmes, aimed at the general public, in particular young people; (ii) specific educational and training programmes within the communities and groups concerned; (iii) capacity-building activities for the safeguarding of the intangible cultural heritage, in particular management and scientific research; and (iv)non-formal means of transmitting knowledge; (b) keep the public informed of the dangers threatening such heritage, and of the activities carried out in pursuance of this Convention; (c) promote education for the protection of natural spaces and places of memory whose existence is necessary for expressing the intangible cultural heritage. Article 15 – Participation of communities, groups and individuals Within the framework of its safeguarding activities of the intangible cultural heritage, each State Party shall endeavour to ensure the widest possible participation of communities, groups and, where appropriate, individuals that create, maintain and transmit such heritage, and to involve them actively in its management. IV. Safeguarding of the intangible cultural heritage at the international level Article 16 – Representative List of the Intangible Cultural Heritage of Humanity 1. In order to ensure better visibility of the intangible cultural heritage and awareness of its significance, and to encourage dialogue which respects cultural diversity, the Committee, upon the proposal of the States Parties concerned, shall establish, keep up to date and publish a Representative List of the Intangible Cultural Heritage of Humanity. 2. The Committee shall draw up and submit to the General Assembly for approval the criteria for the establishment, updating and publication of this Representative List. Article 17 – List of Intangible Cultural Heritage in Need of Urgent Safeguarding 1. With a view to taking appropriate safeguarding measures, the Committee shall establish, keep up to date and publish a List of Intangible Cultural Heritage in Need of Urgent Safeguarding, and shall inscribe such heritage on the List at the request of the State Party concerned. 2. The Committee shall draw up and submit to the General Assembly for approval the criteria for the establishment, updating and publication of this List. 3. In cases of extreme urgency – the objective criteria of which shall be approved by the General Assembly upon the proposal of the Committee – the Committee may inscribe an item of the heritage concerned on the List mentioned in paragraph 1, in consultation with the State Party concerned. Article 18 – Programmes, projects and activities for the safeguarding of the intangible cultural heritage 1. On the basis of proposals submitted by States Parties, and in accordance with criteria to be defined by the Committee and approved by the General Assembly, the Committee shall periodically select and promote national, subregional and regional programmes, projects and activities for the safeguarding of the heritage which it considers best reflect the principles and objectives of this Convention, taking into account the special needs of developing countries. 2. To this end, it shall receive, examine and approve requests for international assistance from States Parties for the preparation of such proposals. 3. The Committee shall accompany the implementation of such projects, programmes and activities by disseminating best practices using means to be determined by it. V. International cooperation and assistance Article 19 – Cooperation 1. For the purposes of this Convention, international cooperation includes, inter alia, the exchange of information and experience, joint initiatives, and the establishment of a mechanism of assistance to States Parties in their efforts to safeguard the intangible cultural heritage. 2. Without prejudice to the provisions of their national legislation and customary law and practices, the States Parties recognize that the safeguarding of intangible cultural heritage is of general interest to humanity, and to that end undertake to cooperate at the bilateral, subregional, regional and international levels. Article 20 – Purposes of international assistance International assistance may be granted for the following purposes: (a) the safeguarding of the heritage inscribed on the List of Intangible Cultural Heritage in Need of Urgent Safeguarding; (b) the preparation of inventories in the sense of Articles 11 and 12; (c) support for programmes, projects and activities carried out at the national, subregional and regional levels aimed at the safeguarding of the intangible cultural heritage; (d) any other purpose the Committee may deem necessary. Article 21 – Forms of international assistance The assistance granted by the Committee to a State Party shall be governed by the operational directives foreseen in Article 7 and by the agreement referred to in Article 24, and may take the following forms: (a) studies concerning various aspects of safeguarding; (b) the provision of experts and practitioners; (c) the training of all necessary staff; (d) the elaboration of standard-setting and other measures; (e) the creation and operation of infrastructures; (f) the supply of equipment and know-how; (g) other forms of financial and technical assistance, including, where appropriate, the granting of low-interest loans and donations. Article 22 – Conditions governing international assistance 1. The Committee shall establish the procedure for examining requests for international assistance, and shall specify what information shall be included in the requests, such as the measures envisaged and the interventions required, together with an assessment of their cost. 2. In emergencies, requests for assistance shall be examined by the Committee as a matter of priority. 3. In order to reach a decision, the Committee shall undertake such studies and consultations as it deems necessary. Article 23 – Requests for international assistance 1. Each State Party may submit to the Committee a request for international assistance for the safeguarding of the intangible cultural heritage present in its territory. 2. Such a request may also be jointly submitted by two or more States Parties. 3. The request shall include the information stipulated in Article 22, paragraph 1, together with the necessary documentation. Article 24 – Role of beneficiary States Parties 1. In conformity with the provisions of this Convention, the international assistance granted shall be regulated by means of an agreement between the beneficiary State Party and the Committee. 2. As a general rule, the beneficiary State Party shall, within the limits of its resources, share the cost of the safeguarding measures for which international assistance is provided. 3. The beneficiary State Party shall submit to the Committee a report on the use made of the assistance provided for the safeguarding of the intangible cultural heritage. VI. Intangible Cultural Heritage Fund Article 25 – Nature and resources of the Fund 1. A "Fund for the Safeguarding of the Intangible Cultural Heritage", hereinafter referred to as "the Fund", is hereby established. 2. The Fund shall consist of funds-in-trust established in accordance with
1.833163
HuggingFaceFW/fineweb-edu
Modern echocardiography owes a salute to the Navy Staten Island Advance By Staten Island Advance Staten Island Advance on May 17, 2010 at 5:25 AM, updated May 17, 2010 at 5:27 AM STATEN ISLAND, N.Y. — Medicine has not been slow or shy about adapting for its own use the innovations of other disciplines. The space program for example, developed the home digital blood pressure device, originally designed for astronauts. A recent adaption of aviation's checklist to improve the safety of surgical procedures made the talk-shows and the bestseller list. This week, I highlight the intellectual gifts from the Navy to the practice of echocardiography. In actual fact, nature pre-empted the Navy by a few million years, as dolphins and bats have always used sound for communication and detection. Man appeared to get into the act around 1912 after the Titanic disaster, when underwater echo-ranging equipment was patented in both England and the United States. During World War I, under great secrecy, the Antisubmarine Division of the Royal Navy developed and deployed submarine detecting equipment, called ASDIC, which used active sound generation and detection of the echoes reflected off underwater structures. Knowing the speed of sound traveling in water, the time from generation to reception of the reflected sound, determined the distance to the reflecting object, hopefully an enemy submarine. By the time of the outbreak of World War II, the Royal Navy had developed a number of different types of ASDIC equipment and shared the technology with the U.S., where it was called SONAR (Sound Navigation and Ranging), the sound equivalent of RADAR (Radio Detection and Ranging). The adaption of this technology to the development of echocardiography is a lesson in networking. In 1953 Dr. Inge Edler, head of cardiology at the University Hospital, Lund, Sweden, was searching for a better way to evaluate the function of the mitral valve (located between the heart's upper left holding chamber and lower pumping one). Surgery was available to open a closed valve but not to close a leaking valve, and the diagnostic difference was a matter of life or death. Fortuitously, Dr. Hellmuth Hertz was working as a graduate student at the University. He was exceedingly well connected, being the son of the Nobel prize winner and director of the Siemens research laboratory. Dr. Edler, enlisted his help, and with a borrowed naval SONAR device from the local shipyard, they began to record the movements of the heart wall and the mitral valve. Publication of their work set off a multitude of further research and in the ensuing decade, development of the clinical and technical aspects of echocardiography expanded exponentially. The same principles applied. The ultrahigh frequency sound generated by a probe placed on the chest was reflected off deeper structures in the chest. The longer the time it took for the echo to return (and we are talking in millionths of a second) the deeper the reflecting structure would be. This allowed a two dimensional picture of the beating heart to be visualized in real-time on a computer screen. Now the motion of the heart walls and the valves could be studied, but the movement of the blood was still invisible. The submarine could be seen, but whether it was moving and how fast remained a mystery. The answer came in an unexpected way! In 1803, in Mozart's Salzburg, Austria, on a cold November night, Christian Andreas was born into the Doppler family which, for generations, had prospered in the stone masonry business. However, he was frail and sickly and as he grew it was apparent that he could not join in the physically exacting family trade, so he became a professor of mathematics. At the age of 38, he published his most brilliant mathematical concept which has become universally known as the Doppler Principle. You can tell, however, from the title of the paper, "On the colored light of the double stars of the heaven," that he really did not have the echocardiogram in mind. Doppler considered both light and sound to be propagated in the form of waves or frequencies. He postulated that if the source of the energy and its observer were getting closer, then the frequency would appear to be bunched up and compressed and it would be appreciated at a higher pitch (if it were sound) or a shorter wave length (if it were light). Conversely, if the source were getting further away, the observer would appreciate the sound to be at a lower pitch than the actual emitted sound or, if light, at a longer wave length and redder than the actual emitted light. The most common example of the principle is the sudden drop in pitch of a train whistle as the train passes the observer. When the Navy incorporated this principle into their SONAR, they could spot the submarine and determine whether it was coming or going and how fast! Again medicine adapted the Navy's technology and when the echocardiographic probe was modified to measure the frequency of the sound in addition to the timing of the echo it could then utilize the Doppler Principle to tell whether blood was flowing backward or forwardthrough a valve and, if so, how fast. Blood flow and the amount of leakage were now measurable. By moving the probe to other sites it became possible to quantitate the degree of blockage in the arteries of the neck and the veins of the leg, using the fact that blood flows faster In the war against disease, it is good to have the Navy on our side.
2.074428
Zyphra/Zyda-2
The unzip5 function takes a list of five-tuples and returns five Bitstreams, analogous to unzip. unzip6 :: Bitstream α => [(Bool, Bool, Bool, Bool, Bool, Bool)] -> (α, α, α, α, α, α)Source The unzip6 function takes a list of six-tuples and returns six Bitstreams, analogous to unzip. I/O with Bitstreams Standard input and output getContents :: Bitstream (Bitstream d) => IO (Bitstream d)Source O(n) getContents is equivalent to hGetContents stdin. Will read lazily. putBits :: (Bitstream (Bitstream d), Bitstream (Packet d)) => Bitstream d -> IO ()Source O(n) Write a Bitstream to stdout, equivalent to hPut stdout. interact :: (Bitstream (Bitstream d), Bitstream (Packet d)) => (Bitstream d -> Bitstream d) -> IO ()Source The interact function takes a function of type Bitstream d -> Bitstream d as its argument. The entire input from the stdin is lazily passed to this function as its argument, and the resulting Bitstream is output on the stdout. Files readFile :: Bitstream (Bitstream d) => FilePath -> IO (Bitstream d)Source O(n) Read an entire file lazily into a Bitstream. writeFile :: (Bitstream (Bitstream d), Bitstream (Packet d)) => FilePath -> Bitstream d -> IO ()Source O(n) Write a Bitstream to a file. appendFile :: (Bitstream (Bitstream d), Bitstream (Packet d)) => FilePath -> Bitstream d -> IO ()Source O(n) Append a Bitstream to a file. I/O with Handles hGetContents :: Bitstream (Bitstream d) => Handle -> IO (Bitstream d)Source O(n) Read entire handle contents lazily into a Bitstream. Chunks are read on demand, using the default chunk size. Once EOF is encountered, the Handle is closed. hGet :: Bitstream (Bitstream d) => Handle -> Int -> IO (Bitstream d)Source hGet h n reads a Bitstream directly from the specified Handle h. First argument h is the Handle to read from, and the second n is the number of octets to read, not bits. It returns the octets read, up to n, or null if EOF has been reached. If the handle is a pipe or socket, and the writing end is closed, hGet will behave as if EOF was reached. hGetNonBlocking :: (Bitstream (Bitstream d), Bitstream (Packet d)) => Handle -> Int -> IO (Bitstream d)Source O(n) hGetNonBlocking is similar to hGet, except that it will never block waiting for data to become available, instead it returns only whatever data is available. hPut :: (Bitstream (Bitstream d), Bitstream (Packet d)) => Handle -> Bitstream d -> IO ()Source O(n) Write a Bitstream to the given Handle.
1.513794
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Category: What Is Write-Only Memory? Article Details - Written By: Mary McMahon - Edited By: Shereen Skola - Last Modified Date: 13 March 2018 - Copyright Protected: 2003-2018 Conjecture Corporation - Print this Article Free Widgets for your Site/Blog In 1793, a French envoy bringing metric units to the US was captured by pirates; he never reached his destination. more... March 22 , 1765 : The British passed the Stamp Act. more... Write-Only Memory (WOM) is a joke concept referring to computer memory that can be written to, but never read. Since this would be logistically counterproductive, manufacturers do not actually produce write-only memory. There may be cases when errors with hardware or software design result in a situation where data can be written to an area that is not accessible. These issues are typically caught in the course of testing and addressed so they don't become frustrating for users. According to legend, the write-only memory hoax started at manufacturing firm Signetics, where an engineer who was frustrated that documentation wasn't being read created its specifications. The goal was to determine whether the review process would catch the clearly bogus standards for a product the company didn't make and wouldn't, since it had no practical use. These were allegedly distributed to customers, who called for more information, alerting the company to the fact that it had unwittingly sent out joke documentation. In April 1972, Signetics took out a two page advertisement for its write-only memory products as a practical joke. The advertisement included technical drawings as well as a list of gibberish specifications like "Vcc=+10 volts." Footnotes intended to mimic those found in other technical advertisements were included, with comments like "For the filaments, what else!" and "Final until we get a look at some actual parts." Numerous copies were circulated by amused engineers and products designers, and can be found archived on several websites for people interested in viewing it. Practical jokes are not uncommon at technology and Internet companies, and many involve spoofs of this nature, marking products and services that don't exist and would be highly impractical if they did. Some include references that will only be comprehensible to members of the industry, or involve inside jokes that may be unfamiliar to everyone but people who work for a given company or department. Lack of communication between engineers and other members of design teams can be an ongoing issue, and is a not infrequent subject of jokes as a result. While Signetics didn't actually plan to produce write-only memory, and neither are other manufacturers, the legend lives on. Engineers can also use the term disparagingly in discussions of devices that have failed and are storing data improperly or inaccessibly. Their references suggest that while the system appears to be perfectly capable of writing the data, locating it later may be an impossible task because of memory corruption or another problem, making it as useful as write-only memory. Ad You might also Like Recommended Discuss this Article Post your comments Post Anonymously Login username password forgot password? Register username password confirm email
1.320425
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Achilles Tendon Disorders The Achilles tendon is the tendonous extension of three muscles in the lower leg: gastrocnemius, soleus, and plantaris. The Achilles tendon facilitates walking by helping to raise the heel off the ground. Two common disorders that occur in the heel are Achilles tendonitis and Achilles tendonosis: - Achilles tendinitis is inflammation of the tendon, generally due to overuse of the affected limb or as part of a strain injury. - More common is Achilles tendinosis, a degenerative condition with inflammation of the tendon, often accompanied by pain and swelling of the surrounding tissue. The symptoms associated with Achilles tendonitis and tendonosis include: - Pain: aching, stiffness, soreness, or tenderness within the tendon. - Tenderness, or sometimes intense pain, when the sides of the tendon are squeezed. - When the disorder progresses to degeneration, the tendon may become enlarged and may develop nodules in the area where the tissue is damaged. Athletes are at high risk for developing disorders of the Achilles tendon. In addition, people with excessive pronation (flattening of the arch) have a tendency to develop In diagnosing Achilles tendonitis or tendonosis, the podiatrist will examine the patient's foot and ankle and evaluate the range of motion and condition of the tendon. The extent of the condition can be further assessed with x-rays, ultrasound or MRI. Treatment approaches for Achilles tendonitis or tendonosis are selected on the basis of how long the injury has been present and the degree of damage to the tendon.
2.321843
openbmb/Ultra-FineWeb
In India, heritage is perceived as a valuable resource and hence the approach to urban redevelopment in old city areas has been based singularly on this premise. It is inherited but cannot be 'consumed' and therefore must be handed over preferably with enrichment, to future generations. Taj Ganj is a four centuries old district. Once an integral part of the monument complex, sharing the peripheral skyline with the Taj Mahal. The Taj Ganj Urban redevelopment project attempts to sew together disparate urban edges that are commercial, institutional, parks, bazaars, old city fabrics and slums and thus present new perspectives of the city that emerge from the multiple layers that have been created over time. It proposes a coherent but nonuniform urban design along stretches leading to it, giving priority to non-motorised mobility through a radical change in the visual texture of the place. Urban interventions at specific nodes such as the Kutta park, a pavilion or two, pause spots, and viewing points make up the value additions to this area. Street as space…a spine The active 'streets as connectors' align visitors to the ethos of the ordinary people as heirs to the cultural legacy along with the Taj. Like all roads, they lead to it; but more importantly through this, begin urban networking and eventually they weave the fabric of the entire city of Agra. The street emerging from the East Gate is textured in cobble of Red Agra, the local stone, up to a distance of zero–vehicular 500 metres zone. Then up to 1200 metres, the cobble continues in granite for the restricted access of motorized vehicles. A 2-way carriageway of width 7.5 metres flanked by footpaths and cycle paths 5 metres wide extends up to the cobbled zone. A walk along this tree-lined path that extends up to shops enroute and is supplied with public conveniences, seats, kiosks, control rooms etc. The way-finding within Taj Ganj and at all gates has been done to make navigation a meaningful and enjoyable experience, the way-finding signage becomes a precursor to creating varied perspectives of the city Cobbling ensures that vehicular traffic explicitly slows down; backed by footpaths merging seamlessly with the road but delineated by bollards, the street is a walker's paradise. But allowing for multiple modes of transport, eac h with its speed and its own system of perception operating simultaneously, the vision for this urban renewal program incorporates non-motorised ones as e-rickshaws and even traditional horse carriages called 'Tongas'. The urban floor plane has been laid in the local and identifiable Red Agra stone and ruby red granite. The homogeneity of materials makes the street and its furniturelamp posts, bollards, benches and the likes provide a cognitive setting to the wondrous monument whose second name is harmony. The lamp post is a sculptural element made in the same stone as the rest of the street furniture — incorporating the proportions of the framing minarets of the Taj and the profile of its graceful dome. Through the use of Jaalis-perforated screens and the play of light, the lamps dot the street, add a measure of romanticism to its character even while placing the monument centre stage. A project by archohm consults. Pictures by Andre J Fanthome
1.29449
m-a-p/FineFineWeb
Life Cycle of a Fruit Tree Fruit trees, such as apples, use flowers to reproduce. Fruit trees, including temperate plants such as apples, pears and cherries, and tropical trees, such as mangoes and citrus, are angiosperms that rely on flowers to reproduce. The life cycle of these trees starts with a seed. Germination Seeds vary greatly in fruit trees, from the tiny apple seed to the large mango seed. The seed holds genetic material that, when conditions are good, begins to grow into a new tree. Growth The fruit tree seed sprouts, using stored starches to grow, and then sends out roots that collect water and nutrients. Stems and leaves also grow, providing sugars for the tree through photosynthesis. The fruit tree matures over time and then reproduces. Reproduction Fruit trees flower to reproduce. In each flower are male anthers that make sperm-laden pollen and the female pistil, consisting of the stigma at the tip, the style and ovary at the base. Pollination Insect pollinators move the pollen from the anthers to the stigma. Sperm cells enter the stigma, travel through the style and into the ovary to fertilize the ovules inside. Seed Development The fertilized ovules become seeds. The ovary grows into a modified seed pod, with a thick wall around the seed. This wall is full of sugars that taste sweet and are good to eat. Dispersal Once the fruit ripens, it may be eaten by humans or animals, often dropping the seeds to the ground. After contacting the soil, the seeds germinate to restart the life cycle of the fruit tree. references
2.572992
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Invisalign aligners are clear and removable teeth straightening appliances made from thermoplastic material. Invisalign is a custom treatment. Your dentist here at Park Lane will take impressions of your teeth, so that your aligners are a perfect fit for your teeth, rendering them safe and more effective than one-size-fits-all 'boil and bite' methods. The thermoplastic material is BPA-free which means your gums and cheeks will not be susceptible to irritation, unlike with traditional metal braces. You can read more about the Invisalign treatment process here. 1. Avoid hot beverages when your aligners are in. Try to train yourself to remove your aligners before reaching for your hot drink. As your aligners are made from plastic resin, they are susceptible to change, moving out of their set position due to the heat. Eating with your aligner in will also cause food particles to become lodged in your brace, creating a breeding ground for bacteria to settle. 2. Clean your aligner trays regularly. Just because your Invisalign aligners are synthetic, it does not make them immune to bacteria (plaque and tartar). Try to avoid cleaning your aligners with harsh chemicals. A cleaning kit is effective for maintaining your aligners, as well as specific solutions. Your dentist here at Park Lane will advise you on which products to use and can show you how to clean your aligners. You can also simply rinse and brush them in lukewarm water. 3. Keep your aligners in a safe, cool and dry place. Your dentist will provide you with a case in which to keep your aligners. Failing to keep your aligners in a case when you're not wearing them will result in them gathering debris and bacteria, which are never good for your mouth! 4. Don't use mouthwash to clean your aligners, as certain products contain pigments which can stain your aligners. 5. Maintain a good dental hygiene routine. To make the treatment as effective as possible, it is paramount to sustain a healthy dental and oral hygiene routine. This means: – Brushing your teeth twice a day for 2 minutes each time. – Flossing at least once a day to remove food particles that can become lodged in your teeth. It takes roughly 3 hours for food to start attacking and staining your teeth and wearing down your tooth enamel. This means it's important to remove any food particles as soon as possible, preventing your chance of tooth decay. – Avoid the excessive consumption of alcohol and smoking. – Avoid eating with your aligners in. 6. Contact sports. If you play contact sports, remove your aligners and use a protective mouth guard, as you do not want to risk damaging your aligners.
1.3571
openbmb/Ultra-FineWeb
Skip to main content - Research article - Open access - Published: Telomere formation on macronuclear chromosomes of Oxytricha trifallax and O. fallax : alternatively processed regions have multiple telomere addition sites Abstract Background Ciliates employ massive chromatid breakage and de novo telomere formation during generation of the somatic macronucleus. Positions flanking the 81-MAC locus are reproducibly cut. But those flanking the Common Region are proposed to often escape cutting, generating three nested macronuclear chromosomes, two retaining "arms" still appended to the Common Region. Arm-distal positions must differ (in cis ) from the Common Region flanks. Results The Common-Region-flanking positions also differ from the arm-distal positions in that they are "multi-TAS" regions: anchored PCR shows heterogeneous patterns of telomere addition sites, but arm-distal sites do not. The multi-TAS patterns are reproducible, but are sensitive to the sequence of the allele being processed. Thus, random degradation following chromatid cutting does not create this heterogeneity; these telomere addition sites also must be dictated by cis -acting sequences. Conclusions Most ciliates show such micro-heterogeneity in the precise positions of telomere addition sites. Telomerase is believed to be tightly associated with, and act in concert with, the chromatid-cutting nuclease: heterogeneity must be the result of intervening erosion activity. Our "weak-sites" hypothesis explains the correlation between alternative chromatid cutting at the Common Region boundaries and their multi-TAS character: when the chromatid-breakage machine encounters either a weak binding site or a weak cut site at these regions, then telomerase dissociates prematurely, leaving the new end subject to erosion by an exonuclease, which pauses at cis -acting sequences; telomerase eventually heals these resected termini. Finally, we observe TAS positioning influenced by trans -allelic interactions, reminiscent of transvection. Background Telomeres cap the tips of eukaryotic chromosomes and protect them from involvement in the double-strand break repair mechanism and in classic breakage-fusion-bridge catastrophes described by McClintock [1]. Telomeres are maintained at full length, against their shortening at replication, by restoration of 3' terminal repeats by telomerase. However, telomerase is not expressed in most mammalian somatic cells, and once somatic lineages expose their chromosome ends, crisis ensues and normally results in lineage senescence. Oncogenic transformation requires the re-expression of telomerase [2]. We study telomeres in ciliated protozoa, because telomeres comprise an unprecedented mass of the ciliate somatic genome, and because telomeres are developmentally created de novo during its development. Telomeres consist of tandem repeats of a short dG-rich sequence, polymerized by the reverse transcriptase telomerase, templated by an RNA component, and primed by a 3'OH end that pairs with the template (review: [3]). The dG-rich strand protrudes beyond the underhanging 5' strand. For example, Oxytricha macronuclear telomeres consist of the 20 bp, dGGGGTTTTGGGGTTTTGGGG, with a 3' protrusion of the 16 nts TTTTGGGGTTTTGGGG [4]. These telomeric repeats comprise a biochemically significant fraction (~2%) of Oxytricha macronuclear DNA; they also tip the telomeres of the mitotic chromosomes of the Oxytricha micronucleus [5]. Raw, broken ends are occasionally "healed" by telomerase, but healing is a normal event in the massive somatic genome re-organizations seen in ascarid worms [6] and in ciliated protozoa. Molecular biology of telomeres began in ciliates [7, 8], rich sources of telomeres and the proteins that create and service them, including telomerase (reviews: [3, 9]). Ciliates provide the opportunity to study the molecular genetics of de novo telomere formation during the programmed development of the somatic macronucleus (MAC) from a mitotic copy of the germline micronucleus (MIC). Telomere components and telomerase are homologous across the range of crown eukaryotes – with a few notable exceptions (review: [3]) – from which ciliates diverged maybe one billion years ago [10]. Thus, characters shared with mammals high-light critical features of telomere metabolism. Additionally, ancestors of modern ciliate classes have been diverging for a large fraction of these billion years [10], and thus the study of telomere biology in various ciliates also provides a rich diversity for comparison. Molecular biology of telomeres has been studied primarily in two ciliate clades, the Spirotrichs and the Oligohymenophorans. In the Spirotrichs (previously Hypotrichs), the Stichotrichs – Oxytricha and Stylonychia species – and the early-diverged Euplotids have been intensely studied for their dramatic extents of developmental chromosome fragmentation and elimination of MIC-limited sequences. Of the Spirotrich telomerases, Euplotes' has been studied most intensely, although likely it is very similar to Oxytricha 's [1113]. The Oligohymenophorans Tetrahymena and Paramecium, while not displaying such dramatic extents of chromosome fragmentation, have played a unique role in telomere biology [3]. Ciliate nuclear dimorphism Following pair-wise mating (conjugation), each exconjugant replaces its old parental MAC with a new MAC, developed from a mitotic daughter of its genotypically new zygotic nucleus (review: [14]). The mitotic sister of the MAC precursor (anlage) is set aside as the new diploid germline MIC, which is then heterochromatically silenced; all known gene expression is from the MAC or MAC anlage [1517]. Once the anlage begins differentiation, the old MAC is apoptotically destroyed [18]. The mature exconjugant resumes feeding and establishes a vegetative clone (a karyonide) propagated by binary fission, in which the MIC replicates as a typical diploid mitotic nucleus and the MAC replicates amitotically. Macronuclear development Ciliates employ a strategy of irreversible genome alterations to generate the MAC, a specialized gene-expression organelle. Analogous developmental strategies have evolved several times outside the ciliates, scattered across phyla [15, 19]; thus, mammalian immunity depends on irreversible somatic genome alterations [20]. Initially the MAC anlage's chromosomes are endo-reduplicated, evidenced by visible polyteny in a variety of ciliates. The ploidy can reach ~64 in some Spirotrichs [21, 22]. Thus, each sequence that survives subsequent elimination (MAC-destined) is represented by numerous polytene chromatids; in principle, each could be processed differently. Near the end of endo-replication in Spirotrichs many transposons and transposon-like sequences are eliminated by precise excision (Internal Eliminated Sequences or IESs [23]). Excision directly precedes massive chromatid fragmentation and de novo telomere formation ("chromosome healing" [9]) and the degradation of IESs and of "spacer" DNAs that lie between blocks of sequences destined for different MAC chromosomes. The surviving sequences (as few as 5% of the germline sequences) reside on many small MAC chromosomes, which are then highly amplified to the level of the mature MAC. The Oxytricha MAC genome is typical of those of other Spirotrichs. It consists ~1000 copies of ~20,000 different tiny, acentric linear chromosomes. They range in length from ~0.5 kbp to >15 kbp (number average length, ~2.4 kbp; J. Garrett, K.R.W., D. Witherspoon and G.H., unpublished), comprised almost exclusively of transcription units. Many carry only one gene (review: [24]), but some carry two or three genes each ([25]; N. Sanders, B. Fausett, T.G.D., K.R.W. and G.H., unpublished). Not all identical polytene chromatids of the anlage are processed identically, as evidenced by the generation of alternative processing families of MAC chromosomes. We have studied alternative processing of the 81 MAC locus, which generates a family of three overlapping chromosomes ([26, 27]; see Fig. 1, below). Analogous phenomena have been described in other ciliates [2831]. Figure 1 figure 1_42 Alternative processing of the 81-MAC locus. In the center are maps of the three MAC chromosomes generated from the 81-MAC locus (after [25]), with their genes'
1.988347
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
cyberspace and internet The term cyberspace came into being in regard to managing physical spaces. In order to define Cybersecurity in more depth, we shall first define the two components of the word: Cyber + Security.Cyber is a word extracted from cybernetics or cyberspace, so we will explore these first. It is a way for the information, i.e. Difference between Cyberspace and Internet Key Difference: Internet is a network of networks, what that means is that it is a global network that is creating by linking smaller networks of computers and servers. This network allows users to share information and other data from one point to another. It can be said that anything that is done via the use of Internet, occurs within the confines of the cyber-space, whether that is sending an e-mail, a website, or playing a game, all of these things exist within the cyber-space. Real Tools. It includes the World Wide Web (Web), the USENET newsgroups and the Internet Relay Chat (IRC). The internet has upended the way citizens, governments, and businesses interact. I have no complaints. Image Courtesy: ealaine.deviantart.com, culturedigitally.org. europarl.europa.eu. Net-based attacks disrupt information on the Internet and finally, the World Wide Web is a gold mine for information and tools that can be used to facilitate crime on and off of the Internet. Real Attacks. The Internet is the largest area of cyberspace. Internet is a synonym for cyberspace in computer world topic. The terms do mean two different things, but the confusion arises due to the fact that these things are closely interrelated, due of which they are often mistakenly used interchangeably. Cyberspace itself comes from "cybernetics," which in turn is derived from the Ancient Greek "kybernētēs", which means 'steersman, governor, pilot, or rudder'. The Web is the most popular destination, and this consists of millions of Web sites. Wherever the Internet is used, you could say, that creates a cyberspace. Februar 1996 von Davos aus online publiziert. All data is transferred within the cyberspace. Cyber-space is nothing more than a symbolic and figurative space that exists within the scope of Internet. Definition of cyberspace : the online world of computer networks and especially the Internet Examples of cyberspace in a Sentence We send e-mails through cyberspace. Comparison between Cyberspace and Internet: The notional environment in which communication over computer networks occurs, A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols. cyberspace Bedeutung, Definition cyberspace: 1. the internet considered as an imaginary area without limits where you can meet people and…. Its stakeholders work together to preserve the cross-border nature of the Internet, protect human rights, fight abuses, and enable the global digital economy. ... Internet of Things, popularly called as IoT, is made of devices that are connected to the internet and share data conjointly. exist, especially when information is passing between one computer and … Der Anlass, aus dem er verfasst wurde, war die Verabschiedung d… A Bavarian court convicted CompuServe's German manager of violating German antipornography laws, imposing a two-year suspended sentence and fining the manager $56,200. Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses. Der Themenschwerpunkt „Digitalisierung, vernetzte Gesellschaft und (Internet)Kulturen" schafft fakultätsübergreifend Brücken an der Universität Passau: von den Sprach- und Kultur- über die Wirtschaftswissenschaften und die Informatik bis hin zu den Rechtswissenschaften und zur Psychologie. The book itself is akin to the internet. The terms do mean two different things, but the confusion arises due to the fact that these things are closely interrelated, due of which they are often mistakenly used interchangeably. Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners. Schedule a demo. The Internet forms the largest cyberspace environment, housing many sub-environments within it. As nouns the difference between internet and cyberspace is that internet is any set of computer networks that communicate using the internet protocol (an intranet) while cyberspace is a world of information through the internet. Avatars are commonly featured in cyberspace. Internet information services as defined by the Cyberspace Administration of China will soon include digital platform-based firms, news agencies, information providers and … Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce. The Dark Web: What It Is And How It Works: Cloudbleed Is Just The Latest Internet Security Disaster: Real Attacks. My professor was impressed by my essay on literature. Download our free guide and find out how ISO 27001 can help protect your organisation's information. Eine Unabhängigkeitserklärung des Cyberspace (englischer Originaltitel: A Declaration of the Independence of Cyberspace) war einer der bis heute einflussreichsten Artikel über die Machbarkeit und Legitimierung von staatlicher Kontrolle und Hegemonie auf das schnell wachsende Internet. The philosopher Michel Foucault used the term heterotopias, to describe such spaces whic… However, with the onset of the Internet, the term has been applied to the virtual space that is created within the Internet. It is a way for the information, i.e. Beschreibung . World 10 1. Squalio is an information technology group that delivers solutions and services for secure and effective IT management. Cyber Intelligence Sharing And Protection Act (CISPA) Legislation regarding this act was originally introduced in 2011. Second, cyberspace includes but is not limited to the Internet — cyberspace also includes computers (some of which are attached to the Internet and some not) and networks (some of which may be part of the Internet and some not). MIRACL provides the world's only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs. The act is an amendment to the National Security Act of 1947, which does not cover cyber crime. Cyberspace. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet. The term cyberspace has led to the introduction of other words, such as cyber security, cybercrime, cyberwar, cyberterrorism, etc. Cybersecurity is the protection of cyberspace (computers, networks, software, and data) from danger and threat with the goal of making it stable, safe, and resilient.. Cyberspace is nothing more than a symbolic and figurative space that exists within the scope of Internet. Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, … Connecting you to the best in the business. One way to talk about cyberspace is related to the use of the global Internet for diverse purposes, from commerce to entertainment. It allows the transfer of data and information. Any device connected to the Internet has direct access to cyberspace which can be used for everyday tasks such as sending and receiving e-mail and making purchases online as well as managing personal bank accounts and paying bills. story or text, to be conveyed from the author to the reader, similar to how the Internet transfers data between two computers (or server and a computer). The Committee on Cyberspace Law provides a forum for analysis of corporate, transactional and regulatory issues related to the internet and digital technologies. Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide. These include the World Wide Web (Web), USENET newsgroups and Internet Relay Chat (IRC). All content © 2021 Cyber Security Intelligence, The Dark Web: What It Is And How It Works, Cloudbleed Is Just The Latest Internet Security Disaster, « Cybersecurity Has A Serious Talent Shortage. Computers, network cables, routers, switches - these all make up the internet. However, with the onset of the internet, the term has been applied to the virtual space that is created within the internet. Cyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications. The truth of the matter is that it is something in the middle. I had originally been interested in how people with rare disorders makes sense of the new genetic explanations that were given to them by medical professionals. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. The data can be in the form of text, image, or video. If we think about cyberspace as a continuum, on one side we have idealists, keyboard warriors, early adopters, and philosophers who feel passionately about the freedom of the Internet and the independence of cyberspace,
2.037514
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
ue de sarcomes osseux a ete observee chez neuf animaux sur dix. Le type histologique predominant est l'osteosarcome osteogenique et il faut signaler egalement les tumeurs bilaterales observees chez deux animaux. (auteurs) 18. Study of contamination by 100 {mu}Ci of Sr 90 in the rat: clinical, hematological and osseous effects (appearance of osteosarcomas); Etude d'une contamination par 100 {mu}Ci de Sr 90 chez le rat: consequences cliniques, hematologiques et osseuses (apparition d'osteosarcomes) Graf, B.; Lafuma, J.; Parmentier, C.; Parmentier, N. [Commissariat a l' Energie Atomique, Fontenay-aux-Roses (France). Centre d' Etudes Nucleaires 1968-07-01 Clinical, hematological and osseous effects following an intramuscular injection of 100 {mu}Ci 90 Sr were studied in the rat. In spite of the magnitude of the injection and the resulting damage, the elimination of strontium could compare with what occurs after an injection at tracer doses. Comparing with the controls at the outcoming time, clinical monitoring mainly brought out a loss of body weight. Fairly early (20. - 30. day) there occurred severe hematological damage, especially on lymphocyte line, which subsided spontaneously. As foreseen, the anatomo-pathological survey of the early period showed bone and medullar lesions in the areas of enchondral ossification. In the late period, bone sarcomas occurred in nine animals out of ten. The outstanding histological type was osteogenic osteosarcomas; besides, two animals experienced bilateral tumors. (authors) [French] Les auteurs etudient les consequences cliniques, hematologiques et osseuses d'une contamination par 100 microcuries de Sr 90 injectes par voie intramusculaire chez le rat. Malgre l'importance de la contamination et les lesions consequentes, l'elimination du Sr 90 est comparable a celle que l'on observe apres injection de doses traceuses. La surveillance clinique ne met essentiellement en evidence, a la periode terminale, qu'une diminution du poids par rapport aux temoins. Les lesions hematologiques sont importantes, predominant sur la lignee lymphocytaire. Elles sont relativement precoces (20e - 30e jours) et regressent spontanement. La surveillance anatomo-pathologique de la periode precoce a montre, comme il etait previsible, des lesions osseuses et medullaires dans les zones d'ossification enchondrale. A la periode tardive, la survenue de sarcomes osseux a ete observee chez neuf animaux sur dix. Le type histologique predominant est l'osteosarcome osteogenique et il faut signaler egalement les tumeurs bilaterales observees chez deux animaux. (auteurs) 19. La clinique parapsychologique Evrard Renaud 2007-09-01 Full Text Available Les deux dernières décennies ont vu naître une discipline nouvelle: l'accueil et le soutien psychologique des personnes vivant des expériences exceptionnelles. Avoir l'impression de vivre dans une maison hantée, témoigner de l'apparition d'un OVNI, se questionner sur les possibilités d'influences télépathiques ou encore garder pour soi la sensation déréalisante d'une sortie hors-du-corps, tels sont quelques exemples de ce que rapportent ces personnes. L'hétérogénéité de ces plaintes fait qu'on les classe souvent dans la catégorie des «expériences vécues comme paranormales». Si de tels récits sont toujours parvenus aux oreilles des cliniciens, on doit à des travaux récents une restructuration de l'écoute de ces personnes. 20. Les leishmanioses cutanées à Leishmania major et à Leishmania tropica au Maroc: aspects épidémio-cliniques comparatifs de 268 cas Chiheb, Soumia; Slaoui, Widad; Mouttaqui, Tarik; Riyad, Meriem; Benchikhi, Hakima 2014-01-01 Introduction Depuis 1995, le Maroc a connu une réactivation des foyers de leishmanioses cutanées (LC) à L. major et une nouvelle répartition géographique des foyers à L. tropica. Le but de cette étude est de comparer les aspects épidémio-cliniques associés aux LC potentiellement dûes à L. major et à L. tropica. Méthodes Une étude rétrospective a colligé 268 cas de LC au service de dermatologie du CHU Ibn Rochd de Casablanca entre Janvier 1995 et Septembre 2010. Les données étaient analysées par Epi info version 3.5.1. Le test X2 était appliqué (Différence significative = p< 0,05). Résultats Deux cent soixante-huit cas de LC ont été colligés, dont 160 femmes et 108 hommes. Ils ont été répartis en 123 patients originaires des foyers à L.major et 145 patients originaires des foyers à L. tropica. L'aspect ulcéronodulaire, ulcérovégétant ou végétant était retrouvé dans 58 cas (47,2%) des cas de LC à L. major versus 24 cas (16,7%) dans la L.C à L. tropica. L'aspect papulonodulaire était retrouvé dans 84 cas (58%) de LC à L. tropica contre 41 cas (33,3%) de LC à L. major. Conclusion Dans la LC à L. major, l'atteinte des membres et les aspects cliniques végétant ou ulcéro-végétant restent toujours prédominants. Dans la L.C à L. tropica, l'atteinte papulonodulaire unique du visage reste prédominante mais des formes ulcéronodulaires, végétantes ou ulcérovégétantes existent également dans les foyers récents à L. tropica, prêtant à confusion cliniquement avec des LC à L. major. PMID:25810796 1. Compte-rendu de L'éthique clinique : pour une approche relationnelle dans les soins, 2014, Hubert Doucet, Paramètres, Les Presses de l'Université de Montréal Roigt, Delphine 2017-04-01 Full Text Available In his book L'éthique clinique pour une approche relationnelle (Clinical Ethics: A Relational Approach, Hubert Doucet proposes an approach to clinical ethics that includes various theoretical and practical perspectives, notably that of the philosopher Paul Ricoeur. Doucet argues for a relational vision of clinical ethics practice, an ethics of caregivers that, in his words, "needs to be built from the experience of the disease and adapted to the ill person." 2. Suivi prospectif sur 5 ans des tentatives de suicide en population clinique dans la région de Fès, Maroc Aarab, Chadya; Elghazouani, Fatima; Aalouane, Rachid; Rammouz, Ismail 2014-01-01 Au Maroc, les tentatives de suicide (TS) demeurent un sujet mal évalué à cause de considérations socioculturelles et l'absence d'approche longitudinale. L'objectif principal était d'évaluer le devenir des suicidants après 5ans au centre universitaire psychiatrique de Fès, les objectifs secondaires étaient l'estimation de la prévalence des TS, préciser les étiologies les plus fréquentes, et établir une corrélation entre les paramètres sociodémographiques, cliniques et évolutifs. Etude prospective à visée transversale et longitudinale, incluant les suicidants vus à l'hôpital psychiatrique de Fès, avec un suivi longitudinal sur 5ans. L'évaluation a été faite par un hétéro-questionnaire et le Mini International Neuropsychiatric Interview (MINI) cherchant le trouble psychiatrique sous jacent. On a rec
1.650316
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Can Creationism and Science Co-Exist? Can creationism and science co-exist? This ongoing question has dominated cultural and religious circles for centuries. Across the globe, individuals and institutions continue to debate about the origins of life. While some embrace the scientific theory of evolution, others believe in creationism — the notion that a higher power purposefully formulated mankind. This, of course, is an oversimplification, as there are individuals who embrace a variety of theories that pull from these polar opposites. The main argument at the heart of it all, though, is whether the Bible's scriptures fall in line with scientific theory (and vice-versa). John Lennox, a math professor and author from Oxford University is sharing his belief that creationism and science can peacefully co-exist. In his new book entitled, "Seven Days That Divide the World" Lennox maintains that Christians can believe in science's theoretical constructs, while embracing Biblical scriptures as truths. In an interview with The Christian Post, he says: "I think that sometimes people have been taught there are only two possibilities: Possibility one is that if you are being faithful to Scripture, you have to be a young earth creationist. Otherwise you're an evolutionist or a theistic evolutionist, and you're not faithful to Scripture. I don't think that is the case…" …it's not a quest of trying to keep up [with science], but it's a quest of looking at what God has revealed of Himself in nature, and looking at what God has revealed of Himself in the Bible and trying to make sense of those two." According to the Post, Lennox challenges Christians to look into the Bible to find areas where God's account of creation and science's explanations intersect. He believes wholeheartedly that adherents shouldn't be afraid to look for corroboratory evidence. Furthermore, he says that the Bible purposefully oversimplifies various teachings, including the creation story, to make them more universally understandable: In his book, Lennox first suggests that Genesis teaches readers the possibility that the seven days are suggestive of a more complex process… He continues, "If the biblical explanations were at the level, say, of twenty-second century science, it would likely be unintelligible to everyone, including scientists today. This could scarcely have been God's intention. He wished His meaning to be accessible to all." Interestingly, Lennox believes that that Bible is ahead of its time in a scientific sense, highlighting its insinuation that the universe had a beginning far before science had contended the same. Click here to read more about these fascinbating ideas. (h/t The Christian Post) Benghazi, IRS, AP...What's next? Only TheBlaze TV offers the truth from Glenn Beck, Andrew Wilkow, and Real News from TheBlaze. Get instant access and a free trial here. - John McCain Lectures Tea Party Senator on How 'Business' Gets Done in Congress: 'That's What We've Been Doing for a Couple Hundred Years' 555 Comments - Boy Scouts of America Vote to Allow Gay Members 506 Comments - Pope Francis' Sermon Sparks Debate: 'Even the Atheists' Have Been Redeemed 'With the Blood of Christ' 480 Comments - Obama Doesn't Return Marine's Salute, Shakes Hand Instead — Is This a Protocol Misstep? 333 Comments - Piers Morgan Bans Dana Loesch From His Show Following Twitter Spat: 'Show Some Bloody Respect' 333 Comments - Game-Changing Bombshell? There's a Major Twist in the Story About a High School Student's Lesbian Relationship With a Minor 219 Comments - Is the Boy Scouts' Gay Amendment the 'Beginning of the End' for the Group? (Plus: Tell Us Where You Stand) 231 Comments - MSNBC Hosts Martin Bashir and Chris Hayes Claim London Machete Killers Aren't Terrorists: 'These Are Just Murderers' 141 Comments - Did You Catch the Possibly Policy-Changing Ft. Hood Reference in Obama's Terror Speech? Read More - Dem. Rep. Apologizes for Attending 'Racist, Anti-Semitic and Homophobic' Speech Read More - Have You Had Scotch at a NJ TGI Friday's Lately? You Might Have Been Drinking Rubbing Alcohol Read More - Venezuelan President Blames Toilet Paper Shortage on the Rich Read More - This Terrible Chart Shows the Change in Food Stamp Participation Over the Last 10 Years Read More - Disney Makes Absolutely Mortifying Photoshop Mistake Read More - Trey Gowdy at It Again — This Time with a Jack Bauer Reference! 117 Comments - Lion Named 'Bonedigger' and Small Dog Make Most Unlikely Companions Read More - Rocket Bike Sets Land Speed Record — and Uses a Fuel You Wouldn't Expect Read More - How 3D Printing Technology Created a Special Part for Baby's Windpipe and Saved His Life Read More - 6 Fascinating Spy Gadgets You'll Probably Want (and Can Have) After Seeing Read More - How Would a 3D-Printed Shotgun Slug Hold Up? Here's the Test Read More - Ex-Guatemala president extradited to US - Calif. plastic ocean debris bill dies in committee - No bail for Pa. parents in faith-healing death - Rare Superman comic found in house insulation - Grizzlies, Memphis ready to 'believe' vs Spurs - Schumer urges look at security in Sprint deal - IMF chief named key witness in French payoff case - Furlough Friday: Unpaid day off for many in gov't
1.630834
HuggingFaceFW/fineweb-edu
Skip to main content Why Do I Need Dental X-Rays? Dental X-Rays are a routine part of normal dental care for all age groups—and for good reason. X-rays are the one reliable way to eliminate the risk of tooth decay and other oral health issues going unnoticed. Dental problems often develop between or inside of teeth, making them undetectable during a visual exam by a dentist. Problems that go undetected for too long inevitably develop into much more painful and serious dental problems that can be easily prevented with X-rays. While staying up to date on dental visits (including having X-rays taken) is important preventative care, you might still have concerns and questions about the importance, safety, and cost of X-rays. If so, you are in the right place to read on as we dig deeper into these questions. What's Included? A full set of dental X-rays includes 14-20 images taken of the teeth, gums, and jaw. The process takes about 5 minutes without any pain or discomfort. This full set is generally taken during a patient's first visit with their new dentist to establish baseline oral health. These images allow the dentist to see specific areas of the mouth as well as the mouth and bite alignment as a whole. X-rays are not usually required at each dentist visit. Depending on the oral health of each patient, some dental X-rays may need to be taken every 6 months or not again for a couple years. Children typically require X-rays more frequently than adults due to their still-developing mouths, and presentation of new issues can come about more frequently. These are three common types of X-ray images taken: - Bitewing: The Bitewing X-rays involve biting down on a sensor unit that is placed in different parts of the mouth for each image. Images are captured of each specific area, allowing the dentist to see individual teeth and more detail of the gumline. Bitewing X-rays are often for the purpose of identifying decay in and between teeth or at the gums. - Panoramic: A Panoramic X-ray will capture the entire mouth in one image. The patient bites down on a "bite blocker" for the image to be taken. The resulting image includes all of the teeth, the jaw bones, and tissues and structures surrounding the area. Although the mouth is a curved structure, the panoramic X-ray produces a flat image, providing a full visual indicator of oral health. - Occlusal: Occlusal X-rays are generally used by pediatric dentists to determine the development of the entire arch of teeth and to help assess bite alignment in children. These X-rays are taken in a way similar to Bitewing X-rays. Why Are X-Rays Needed? X-rays serve to assist dentists in diagnosing issues that often arise inside and between the teeth. Without the use of X-rays, these issues would go unseen and develop into more painful, serious, and costly issues to be dealt with in the future. These are some of the oral health problems X-rays are able to show: In Adults - Decay between and inside teeth - Decay beneath fillings - Bone loss in jaw - Damage or inflammation due to infection - Position and Condition of teeth in preparation for various procedures (crowns, braces, etc.) - Abscesses - Cysts and certain kinds of tumors In Children - Development of decay - Adequacy of space to fit incoming teeth - Development of wisdom teeth - If impaction is present (teeth unable to emerge through gums) Are Dental X-Rays Safe? Dental X-rays have technologically evolved in recent years and are generally regarded as safe. Most dentists have moved away from film X-rays to digital imaging. Film X-rays would emit higher levels of radiation. Digital X-rays do still emit low levels of radiation, but these levels are up to 90% less than film. Patients having more frequent X-rays are exposed to more radiation, increasing the potential risk of harmful effects. Given the extremely high value of X-rays for oral health, the benefits are considered to greatly outweigh the potential risks. Patients typically wear a heavy leaded apron over their body to further limit the exposure to the already low level of radiation that is emitted. It is helpful to remember that the level of radiation exposure caused by dental X-rays is many times lower than the normal radiation we are exposed to every year through many sources we do not often think about including soil, water, air travel, cell phones, using natural gas to cook with, etc. Safety For Children It is safe for children to have X-rays taken. The amount of radiation they are exposed to by the X-ray is considerably less than exposure from their usual background environment. They also have the protection of the leaded blanket and a leaded collar to block exposure for most of their body. Having X-rays taken is highly beneficial for children's overall oral health, greatly outweighing the risks of harmful effects. X-Rays During Pregnancy Be sure to let your dentist know if you are pregnant. Many pregnant women will postpone dental X-rays during the first trimester while important development is taking place inside the womb. However, the leaded apron covers the abdomen, protecting mom and baby from radiation exposure. Pregnancy is an important time to stay up to date on dental care. While the child in the womb is siphoning many nutrients from mom's body including Calcium, many mothers experience that their teeth become more vulnerable and need the attention of a dentist as much as ever. Overall, pregnancy is not a time to avoid seeing the dentist. Costs and Coverage For X Rays A full set of X-rays can cost between $85-$250. However, a full set is not required each time dental X-rays are needed. Most dental insurance plans cover the cost of necessary X-rays, sometimes also requiring a copay between $5-$50 or a limit on the amount of X-rays allowed to be covered. Overall, your oral health is greatly aided by having X-rays taken on schedule with your dentist. Hopefully this article answers any questions you may have had about dental X-rays, their importance, safety, and cost. If you have any further questions regarding X-rays or your ability to receive one, never hesitate to contact us at Family Dental Health Center. Our staff of professional, experienced providers can provide you with all the information you'll need to consider your next dental visit.
2.144412
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Cars and Loans _URL_ cars and loans teacher's guide 9-i Being prepared is the best way to keep car-buying choices and decisions on the right track. Students need to examine all aspects of the car-buying process including: understanding the differences between buying and leasing; evaluating used cars; financing; applying for loans; and finding the best auto insurance. For related links and resources on this lesson, visit: cars and loans websites "Should I buy a new car or a used car?" "Where is the best place to finance my automobile purchase?" "Is it better to take the rebate or the low-rate financing plan?" These are typical questions asked by people buying vehicles. In this lesson, students are asked to identify costs associated with owning and operating a motor vehicle. Since these costs are commonly underestimated, guidelines are provided on how much to spend when buying vehicles. The material provided in this lesson will address the many factors and decisions involved in purchasing and financing a vehicle. In addition to comparing used and new cars, we also cover warranties, service contracts, and financing the purchase. Other issues related to using credit for buying a car include the information required by the Truth-in-Lending law, use of a co-signer, Finally, various aspects of auto insurance are discussed. Students will learn about types of coverages, factors affecting insurance costs, and comparing insurance companies. Investigate the legal and financial responsibilities of buying, maintaining, insuring, and operating a car, and translate those responsibilities into a monthly budget. List some of the costs of owning and operating a car ■ Given a budget, decide how much you can afford to pay for a car List some of the things you should research and some decisions you should make before you begin to shop for a car Understand the di
2.049538
m-a-p/FineFineWeb
How do animals move? Animals are related to everything around them. They relate to each other and their environment, which is everything around them, light, water, soil and other living things in their environment. For this relationship to exist, they use the movements. They move to look for food, to escape the dangers, to play among themselves, but these movements are not equal. Some animals make great trips by land, sea and air. Storks, whales, sea turtles, salmon travel thousands of kilometers. These long trips that animals make are called migrations, and they are made to find the ideal conditions for reproduction and in search of food. Geese living in North America are another example. Animals can jump, run, swim or fly doing a series of characteristic movements that are worth them to move in the middle How I know move the animals? Animals can move in several ways. We all see how they can jump, run, swim or fly making a series of characteristic movements that are worth them to be able to move in the middle and occasionally dabble in other environments where they are not so adapted. This is how we can see fish that may be able to fly or climb tree trunks, swimming and diving birds, as well as land mammals that reach a remarkable domain of the flight they have planned. Let's see how the animals move. How birds fly Insects and flying birds flap their wings, supporting themselves in the air and moving the body forward. Both are equipped with ingenious mechanisms to fly. The former have rockers that act as a kind of gyro in order to secure the direction. How animals move in water The animals that live in the rivers, seas or oceans, travel practicing many movements. Among the most famous is the wave movement of the vertical tail of the fish, which in practice acts as if it were a propeller propeller. There are more movements, in the case of the wave of eels or rowing propulsion carried out by turtles or palm-eyed birds. How reptiles move Reptiles as their own name indicates crawling, moving crawling on the ground. Not only do those with no legs crawl, such as snakes, so do the other reptiles, in the case of the lizard or other saurs that move on their short limbs and wave the trunk muscles. The earthworm advances by shrinking and lengthening the anterior part of the body. How mammals move A good part of mammals that have four legs move along the ground. Of course, some use other ways to move. Aquatic mammals, in the case of seals, whales or dolphins, swim through the fins. We can see the bats flying over the forelimbs, which are fins. The monkeys use their hind legs and their hands. Some make it upright. Humans are bipeds and they walk or run on their two lower extremities. We hope you have been clear about the way in which animals move, of course, we cannot say that there is no variety of ways! How do animals move in water? The squid travels with propulsion with a jet of water that runs through a funnel or There is many more forms of locomotion of animals in the water than in the air. The forms of locomotion in water range from simpler movements, As the ameboid or ciliary, to the movements wavelets, of the tail, of the dorsal fin or of the whole body, up to reaction or propulsion movements With oars What animals use the wave motion? The eel or water snakes, which have the muscles arranged longitudinally, they move in the water rippling his entire body. Instead, almost all fish have the crosswise muscles, so that they move undulating the vertically placed tail, which works like a ship propeller. The seahorse does not have fins or tail very adapted to the movement, so advances by quickly waving its only fin dorsal as a propeller. How does the reaction movement occur in animals? Jellyfish, octopus, cuttlefish and squid advance projecting a jet of water back. The principle of locomotion of these marine animals is the same that man uses in jet engines. In the squid, movement is possible thanks to the mulch, a conical envelope surrounding the internal organs of these animals, which dilates and contracts by expelling water from an adjustable funnel Forward or behind. More information on animals. There are animals that fly like sparrows, eagles, pigeons,. Many swim Snakes, snakes crawl, drag their bodies and move with agile movements Animals have legs, wings, fins for running, flying or swimming.
2.568797
Zyphra/Zyda-2
range boost, making it ideal for longer rides or when you want to conserve battery power. Lower maximum speed settings Some electric bikes allow you to adjust the maximum speed at which the motor will assist you. Lowering the maximum speed setting can help preserve battery power, especially if you frequently ride at high speeds. By reducing the assistance provided by the motor at higher speeds, you can extend your battery's range and ensure that it lasts longer between charges. Experiment with different maximum speed settings to find the balance between speed and battery efficiency that works best for you. Proper Tire Inflation Check tire pressure regularly Regularly checking the tire pressure on your electric bike is an essential maintenance practice for both safety and efficiency reasons. Underinflated tires can increase rolling resistance, making it harder for your electric bike's motor to propel you forward and ultimately draining your battery faster. On the other hand, overinflated tires can result in a harsh and uncomfortable ride, while also increasing the risk of punctures. Use a reliable tire pressure gauge and consult your electric bike's manual for the recommended tire pressure. Maintain recommended PSI Maintaining the recommended tire pressure, measured in pounds per square inch (PSI), is vital for optimizing your battery's efficiency and ensuring a smooth ride. The optimal tire pressure is typically specified by the tire manufacturer and can vary depending on the tire type and size. Riding with the correct tire pressure maximizes traction, reduces rolling resistance, and allows your electric bike to perform at its best while minimizing unnecessary strain on the battery. See also Top Climbing Frame Accessories in the UK Avoid overinflation While maintaining proper tire pressure is important, it is equally crucial to avoid overinflating your tires. Overinflated tires can result in a harsh ride, reduced traction, and increased risk of punctures. Additionally, overinflated tires have a smaller contact patch with the road, increasing rolling resistance and making it harder for your electric bike's motor to propel you forward. Be mindful of the recommended tire pressure and avoid exceeding it to ensure optimal performance and battery efficiency. Use low-resistance tires Choosing the right tires for your electric bike can have a significant impact on your battery's efficiency and overall range. Low-resistance tires, also known as eco or energy-saving tires, are specially designed to minimize rolling resistance and increase efficiency. These tires are typically made with a harder rubber compound and have a smooth tread pattern, allowing for easier and smoother rolling. By opting for low-resistance tires, you can reduce energy consumption and improve the overall efficiency of your electric bike. Rotate tires regularly Regularly rotating your electric bike's tires helps ensure even wear and tear, maximizing their lifespan and maintaining optimal performance. Front and rear tires can wear at different rates due to varying weight distribution and braking forces. By rotating your tires, you can evenly distribute the wear and extend their overall lifespan. Additionally, even tire wear contributes to a smoother ride and improves your electric bike's handling, allowing for better energy transfer from the battery to the wheels. Climate Considerations Avoid riding in extreme temperatures Extreme temperatures, whether very hot or very cold, can have a significant impact on the performance of your electric bike's battery. Riding in extremely hot weather can cause the battery to overheat and potentially suffer from thermal runaway, a dangerous condition that can lead to battery failure or even fire. On the other hand, extremely cold temperatures can reduce the battery's efficiency, causing a decrease in performance and range. Whenever possible, avoid riding in extreme temperature conditions to protect both yourself and your electric bike's battery. Protect battery from rain and snow While most electric bike batteries are designed to be water-resistant, it is still important to protect them from excessive exposure to rain and snow. Extended exposure to moisture can potentially seep into the battery's casing or connectors, leading to corrosion or damage. Whenever riding in wet conditions, ensure that the battery is properly sealed and make use of any available protective covers or fenders to minimize water contact. After riding in wet conditions, dry off the battery and connectors before storage. Use insulated covers in cold weather In colder climates, using insulated covers specifically designed for electric bike batteries can help protect them from the cold and maintain optimal performance. Cold temperatures can reduce the efficiency and capacity of the battery, resulting in decreased range and overall performance. Insulated covers help to retain some of the heat generated during operation, keeping the battery at a more suitable temperature and preserving its capacity. Consult your electric bike's manufacturer or specialized retailers for suitable insulated covers. Keep battery cool in hot weather Hot weather can pose challenges for your electric bike's battery, as excessive heat can significantly reduce its performance and lifespan. To keep your battery cool during hot weather, avoid leaving it exposed to direct sunlight for extended periods. If possible, park your electric bike in a shaded area or use a reflective cover to shield it from the sun's rays. Additionally, avoid charging the battery immediately after a ride in hot weather, as the heat generated during charging can lead to further temperature increase. Ride in optimal weather conditions To maximize your battery's range and overall performance, it is ideal to ride your electric bike in optimal weather conditions whenever possible. Mild temperatures, low wind, and clear skies provide the most favorable conditions for a smooth and energy-efficient ride. By avoiding extreme weather conditions such as heavy rain, strong winds, or extreme heat, you can minimize the strain on your battery and ensure that it operates optimally. Regular Battery Testing Check battery voltage regularly Regularly checking the voltage of your electric bike's battery is a simple yet effective way to monitor its overall health and performance. Voltage is a measure of the battery's electrical potential, and a higher voltage indicates a higher charge level. By keeping track of the battery's voltage over time, you can identify any sudden drops or fluctuations that may indicate a battery issue. Consult your electric bike's manual or the manufacturer's guidelines for the specific voltage range and recommended testing intervals. Monitor capacity and range Monitoring the capacity and range of your electric bike's battery is another important aspect of regular battery testing. As the battery ages, its capacity to hold a charge may decrease, resulting in a reduced range. By keeping track of the battery's capacity and range over time, you can assess its performance and identify any changes or signs of degradation. Some electric bikes come with built-in displays or apps that provide real-time information about the battery's capacity and estimated range. Consider professional diagnostics For a more thorough assessment of your electric bike's battery, consider seeking professional diagnostics from a qualified technician or the manufacturer's authorized service center. Professional diagnostics can provide detailed information about the battery's internal health, including cell balance, capacity, and any potential issues. They may also offer recommendations for battery maintenance or replacement based on the specific condition of your battery. Professional diagnostics can provide valuable insights and ensure that your battery is operating at its full potential. Perform a load test A load test is a more comprehensive and in-depth assessment of your electric bike's battery. It involves applying a controlled load to the battery and monitoring its performance and voltage under that load. Load tests help determine the battery's ability to deliver a consistent and reliable power output, especially under demanding conditions. While load tests are typically performed by experienced technicians or specialized battery service providers, it is important to follow the manufacturer's guidelines and consult professionals for accurate and safe testing. Keep track of battery health Maintaining a record of your electric bike's battery health is essential for monitoring its performance, identifying changes over time, and making informed decisions about maintenance or replacement. Keep a log of battery-related information such as charging cycles, voltage readings, capacity measurements, and any notable observations or issues. By regularly updating this log, you can track the overall health of your battery, identify potential patterns or problems, and take proactive measures to ensure its longevity and efficiency. See also Top 10 Girls Scooters for UK Riders Optimal Storage Practices Avoid long periods of inactivity Extended periods of inactivity can have a negative impact on the health and performance of your electric bike's battery. When left unused for a long time, the battery can self-discharge and enter a state known as deep discharge, which can lead to irreversible damage or decreased capacity. To prevent this, if you anticipate not using your electric bike for an extended period, it is recommended to periodically charge the battery and monitor its level to prevent it from fully discharging. Store battery at 50-80% charge When storing your electric bike's battery for a prolonged period, it is best to keep it at a charge level between 50% and 80%. Storing the battery at a full charge for an extended period can contribute to its degradation, while storing it at a very low charge level can lead to self-discharge and potential damage. Aim to charge the battery to a level within the recommended range before storing it, and if possible, check the charge periodically and recharge it if needed to maintain the desired level. Recharge periodically during storage To maintain the health and longevity of your electric bike's battery during storage, it is beneficial to periodically recharge it. Even if you're not using the bike regularly, the battery still requires some regular maintenance to prevent issues such as self-discharge or deep discharge. Aim to recharge the battery to a recommended level every few months, or as specified by the manufacturer. This keeps the battery active and helps preserve its capacity and overall performance. Properly disconnect battery When storing your electric bike or when the battery is not in use, it is important to properly disconnect it from the bike. This ensures that there are no unnecessary power drains or potential electrical issues.
1.395824
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Training and licensing in information security are important parts of doing a good job in IT risk management. With cyber threats becoming more common and complicated, companies are learning to have workers who can handle and reduce IT risks. One of the most recognized qualifications in IT risk management is the Certified in Risk and Information Systems Control (CRISC) certification. In this post, we will talk about how CRISC certification training can help you build a great job as an IT risk manager. Comprehensive Understanding of IT Risk Management One of the best things about CRISC licensing is that it helps people understand all four areas of IT risk management: - Identifying risks - Assessing risks - Responding to risks - Keeping an eye on risks CRISC certification training includes a wide range of topics, such as how to find IT risks, analyze and evaluate them, and respond to and eliminate them. IT workers can learn a lot about the IT risk management process through this training, which is important for doing a good job in IT risk management. Competitive Advantage in IT Risk Management IT workers with a CRISC license also have a leg up on the competition. Employers are looking for people with specialized knowledge and skills in IT risk management because there are more and more jobs in this field. IT workers can set themselves apart from their peers and show their skill in IT risk management by getting CRISC certification. The license also allows companies to judge the information and skills of people who want to work for them. Better Career Opportunities and Higher Salaries CRISC qualification gives you a competitive edge and leads to better job prospects and higher pay. If you earn a CRISC certification, you are certain that your average earning is more. This is more than the average pay for IT risk managers who need to be qualified. CRISC licensing also opens job possibilities in many fields, such as banking, healthcare, and technology. Ongoing Professional Development CRISC qualification is also helpful because it forces professionals to keep learning and growing. Those with a CRISC license must keep it current through ongoing education and other professional development activities. This ensures that people with CRISC licenses are updated on the latest trends and changes in IT risk management. This ongoing professional growth improves a person's knowledge and skills and shows how dedicated they are to IT risk management. Information security training is a great way for IT workers to build a good career in IT risk management. The license shows that a person knows much about IT risk management and is an expert. CRISC qualification gives you an edge, better job prospects, and higher pay.CRISC certification training needs ongoing professional development to ensure people know about IT risk management trends and changes. IT workers can build a strong base for a successful IT risk management job by getting CRISC certification and keeping it up-to-date through ongoing professional development.
1.626282
m-a-p/FineFineWeb
Beyond Pluto, a new frontier of discovery | FLAGSTAFF, ARIZ. It's an old trap in science - to look at a field of research and conclude that all the big questions have been answered, leaving little to do but cross the t's and dot the i's. Robert Millis nearly stumbled into that trap. "I've been a ground-based astronomer my whole career, and I have to tell you, 10 or 15 years ago I was becoming a bit discouraged," he recalls. When it came to the solar system, "the period of genuine exploration - pushing back frontiers and finding totally new things - seemed to me to be over." Now, he and his colleagues find themselves on the vanguard of a group of astronomical pioneers pushing deeper into a frontier known as the Kuiper Belt. Stretching for tens of billions of miles beyond Neptune, the belt is thought to hold at least 100,000 icy relics from the solar system's birth. Dr. Millis, director of the Lowell Observatory here, heads a group that is systematically hunting for these elusive objects in a kind of cosmic census. Their work, along with similar efforts by a handful of other groups, is expected to lay the foundation for building a more complete picture of conditions in the early solar system and explaining how the planets migrated into their current orbits. The work also is expected to provide data that will help astronomers interpret what they see as they look at solar systems forming around other stars. Kuiper Belt objects "have the ability to tell us things we'd never learn otherwise, because they've been sitting out there largely undisturbed for a long period of time," Millis says. "The Lowell group is really at the forefront of charting this third zone of the solar system for us," says Alan Stern, a planetary scientist at the Southwest Research Institute in Boulder, Colo. "When I went to grade school, all of us were taught that there were four rocky inner planets, four gas giants, and one oddball, Pluto. It looked like a misfit, but it's a perfect fit in a different context - the Kuiper Belt. Now we get it." Pluto, long regarded as a planet, has finally found a home as a Kuiper Belt object (KBO). Today, roughly half of the 1,000 known KBOs have been discovered by Millis and his team in a project known as the Deep Ecliptic Survey. The team is in the project's homestretch, sampling the night sky in the northern and southern hemispheres in a band of sky that reaches seven degrees above and below the ecliptic - an imaginary path traced by the sun and the planets as they move across the sky. Unlike the Oort Cloud, a halo of extremely distant icy objects whose orbits trace a rough sphere around the sun, most KBOs appear to orbit the sun roughly in a plane along the ecliptic. Finding the objects is painstaking work. The objects are small, distant, and thus extremely faint. Many are discovered only to be lost because weather, hardware failures, or other factors conspire to prevent timely follow-up observations. Without the orbit information these follow-ups provide, astronomers don't know where to point their telescopes the next time they want to study the object in more detail. One measure of the Kuiper Belt's importance lies in the generous amounts of precious telescope time astronomers are given on some of the world's largest telescopes to explore it. Another measure of intense interest is the New Horizons mission to Pluto and the Kuiper Belt, which the National Aeronautics and Space Administration currently has scheduled for launch in January 2006. The search for KBOs began, if unwittingly, here at the Lowell Observatory. In 1930, Clyde Tombaugh discovered Pluto after carefully photographing the night sky along the ecliptic for a year. By comparing the plates, he spotted an unknown object that moved against the stellar background. "The discovery was ahead of its time," Dr. Stern says, noting that another 62 years would pass before detector technologies advanced enough to allow astronomers David Jewitt of the University of Hawaii and Jane Luu of the University of California at Berkeley to spot the first "official" Kuiper Belt object. The belt's existence had been the subject of speculation for years prior to the duo's discovery. Astronomers Kenneth Edgeworth and Gerard Kuiper had grumbled that it seemed too odd for the distribution of planetary mass in the solar system to rise with distance, only to suddenly plummet after Neptune. They basically concluded that the observation "didn't make much sense" and that there must be other "stuff" farther out, Millis explains. Then in the late 1980s, a team of solar-system modelers decided to test the idea that so-called short-period comets came from the Oort Cloud and were tugged into their relatively quick circuits around the sun by Jupiter's gravity. The modeling team threw Oort Cloud objects at Jupiter from every direction, let the simulation run, but couldn't duplicate the population of short-period comets astronomers actually see today. "So they predicted that there has to be another source region - it's likely to be a disk - and coined the term Kuiper Belt," Millis says. Since the first widely recognized Kuiper Belt object was discovered, the list has grown to include several objects with diameters of 1,000 kilometers or more. This includes Sedna, discovered last year in an orbit that takes it out to nearly 1,000 astronomical units (nearly 93 billion miles) from the sun. These objects are of particular interest because they are bright enough to allow astronomers to make detailed measurements of their properties. These measurements could lead to a better understanding of how the objects formed and what kind of abuse they've taken during their wanderings. The discoveries have led to follow-up observations that raise fascinating questions, notes John Davies, an astronomer at the Royal Observatory in Edinburgh, Scotland. Scientists are trying to see if the population can be sorted by color - some KBOs appear a faint gray, others a faded red. The origins of the colors are a topic of debate. So are the origins of binary KBOs - large objects with a smaller companion orbiting it. Finally, is the far edge of the belt really an edge, or merely a gap? "I keep thinking there could be significant objects farther out there - clearly planet-size objects - but beyond the current reach of our telescopes and cameras," Millis says. "There's no evidence that they're not out there; we just haven't been able to look."
1.746496
m-a-p/FineFineWeb
5 Battlefield Screw Ups That Were Hilarious (Until People Died) The history books are full of great military minds who turned the tides of war with their creative genius. This article is not about them. No, we're here to talk about the embarrassing fuck-ups, the confused incompetence that ensured these men would never have a high school named after them. #5. Flushing a Toilet Sinks a Submarine About five minutes after somebody first drew up the plans for an underwater ship called a "submarine," somebody standing over that guy's shoulder said, "so how do you take a shit in one?" It's not like a regular boat where you can just poop over the side (that's what they do, right?) and the whole physics of a flushing toilet like you have in your bathroom stop working when, instead of a house, you're in a vessel submerged in water exerting massive pressure from every direction. To see what flushing a toilet in that situation would look like, picture the exact opposite of a successful toilet flush. On April 14, 1945, the German submarine U-1206 found this out the hard way. Who Fucked Up? That model of boat had a new, fancy toilet-flushing system that used a complex system of high-pressure valves to allow them to flush the toilets even when running deep under the sea. So complex, that you couldn't operate the system without supervision. But the captain of the submarine, Karl-Adolph Schlitt, figured he would chance it. After all, it's a damned toilet! How complicated can it be? One splashing, cursing, Charlie Chaplin-esque slapstick sequence later, and Schlitt found himself wading through the Atlantic seawater that was quickly rushing into the submarine. Unable to pump the water out, Schlitt had no choice but to surface the sub. Of course, this was in the middle of a war. Oh, and the German submarine just happened to be on a spy mission just 10-miles away from the British coast. It was almost immediately spotted by an English plane, which proceeded to bomb the shit out of the sub. Schlitt found himself unable to escape and gave the order to abandon ship, where every surviving member of the crew was captured. #4. Indians Take Over Fort During a Game of Lacrosse In 1761, the British gained a new post in present day Michigan named Fort Michilimackinac. They also gained some new neighbors in the local Indian tribe. If you've spent five minutes reading an American history text book you'd be able to predict that such a living arrangement could only end in tears. However, the two groups lived in relative peace, at least for a while. It's sort of like The Odd Couple, if you replace the charm of Tony Randall and Jack Klugman with deep-seated racism and impromptu scalpings. With the threat of battle constantly looming over them, members of the Ojibwa tribe lightened the mood by playing lacrosse near the entrance of the fort, silently hoping to shatter a window a la Dennis the Menace. The British adored observing these games, often watching them from the safety of the fort ramparts. As the rivalry between the Ojibwa and the Brits waned, the British started to edge further and further out of the safety of their fort, with smiles and beckoning hand gestures from the Ojibwa. Who Fucked Up? Eventually, years passed without incident and nearly the whole force of the fort came out to enjoy the games, insulting the "savages" and betting on the outcome of the game with each other. This included Captain Etherington, who was the British commander at the fort and had seemingly forgotten why they had a fort in the first place (hint: it had been attacked multiple times in just the previous few months). Then, during a game on June 2, 1763, a ball was hit a little too high and sailed over the walls of the fort. The two closest Ojibwa's chased it into the fort. The soldiers, eager to discover the outcome of the match, left the gates open to let them through. Then more players ran in, then more and, eventually, all the players were inside the gates and the British were still outside wondering when the game was going to resume. Inside, the Ojibwa were handed weapons previously smuggled in before closing the gates and slaughtering almost everyone inside, including Captain Etherington. The game had been postponed on account of vengeance. The Ojibwa went on to hold the fort for an entire year. We're assuming that the British tried to counterattack by playing soccer outside but their plan was somehow ineffective. #3. General Somehow Misses the Enormous Battle The civil war had its fill of frankly embarrassing moves by its Union generals, but some errors can be hand-waved away with excuses such as "misinformation" or "my army is dead." However, "I couldn't find the battlefield of 25,000 men" doesn't really cut it. Who Fucked Up? At the battle of Shiloh, General Lew Wallace was given orders from General Grant for his division to serve as the reserves in case things got a little too messy. So he hung back, lit a cigar and relaxed. At 6am the order came for Wallace to move up and help out in the fight against the Confederates. So General Wallace moved his division out... in the wrong direction. Wallace lead the march, no doubt giving them an inspiring speech all the while. His men were ready to fight the Rebs, for decency, for freedom, for America. A few hours later, noting the distinct lack of blood on their hands, they began to wonder if they were even in America anymore. Wallace's division had been wandering to the point where they were more lost than the cast of Lost on the lost island who had gotten lost in the jungle. Also, they're lost in time. Seriously, where the fuck are we? Somehow, not investing in a compass, map or a friend who could read road signs paid off for Wallace when his men found themselves at the rear of the Confederates, who were firing at Grant's men and doing a damn fine job of it. Wallace had unwittingly placed his army at a classic rear flank position and himself on the cusp of victory. All that was left for him to do was sound the charge, put the Rebel balls in the vice-grip known as Yankee Justice and within hours he'd be getting hammered in a tent with General Grant. Hell, he could even claim it was his idea all along, and go down in history as a military genius. But he wasn't one. Instead, Wallace decided that the much more advantageous position he had accidentally marched to was still wrong, dammit, and a job worth doing was a job worth doing right. So, against all advice, he ordered his troops to turn around and go back to where they were supposed to go. This whole trip took a total of five hours. The men finally reached their original destination, but by then the battle had moved. Rather than mark it all up to a brain fart, Wallace had his men march onwards to the fight. He finally got to Grant's position at 7pm. That's 13 hours of looking for a battle consisting of nearly 25,000 men, a spectacle that frankly shouldn't be that hard to spot. "Are you sure that's our battlefield?" When Wallace finally found Grant's army, he also found a lost battle and a reasonably pissed of General. Wallace, who cost thousands of Union lives and blistered countless Union toes, was removed from command. Recommended For Your Pleasure To turn on reply notifications, click here The Cracked Podcast The Weekly Hit List
1.41315
Zyphra/Zyda-2
How to write a thesis statement for a research paper middle school You must form an academic and state it clearly. Cave does a thesis statement do. Minor thesis statements emanate from the roles of writers with an additional purpose. A thesis statement or outline hook is usually one specific that summarizes the main point of the article. Tell them that the democratic thesis represents what they believe. Friendly is a result of marriage the right resources consistently. If your reader cannot tell your thesis, then you already have a summary of the river or just taught a fact. Cases should be viewed because animals do to remain in the classroom, zoos cannot provide high experiences for animals, and animals in movies get sick and die. This is a special, and there is no way one can count against it. For learning to write thesis statements, you may be involved to write a three-pronged objective statement. If you're required trouble deciding which side to take on a compelling issue, write your thesis statement from two different people of view. Poring in thesis statement is not a one-day mess; it takes time and hard work. The Conclusion The application of a short essay should be the most important part for a few. In this small, you will discover these markers: Peanut butter and have sandwiches are fun to eat because they always new around. Some makes a good teamwork statement in middle ground. A thesis statement is a simple that states the main topic of your essay or paper. Hay students create thesis statements on a thesis of paper. This example should keep you figure out how to write a teacher statement in middle school literary of how broad your topic is. A looming thesis statement is a written sentence with no lights might, maybe, perhaps, etc. Showing this understanding of a strong thesis much, let us do at a stepwise way of how to write a thesis statement in ironic school. Can you support having only five paragraphs in a six-page night. Although you may know how to specific a good essay, you might not starting how to craft a compelling argument statement. Play around with points to change your thesis into a sentence. Restrict vague language — Be cautious to use even and concise words in your story. If your instructor has arrived an essay question to answer, this most has been done for you. Their thesis should tell your ending — You know you have a completely thesis if it asserts your conclusion. An tidy is always debatable. I suggest you need doing your job tomorrow morning, or you'll pay more. Next thing I compound, I was surrounded by angry tax-payers. Do not be wishy-washy. The dictionary should be able to see your writing even before reading the rest of the period. How to write a thesis statement in middle school Choose a topic that has informed — Try to consider notions that have information. Anxious thesis statements emanate from the challenges of writers with an unclear discovery. Consider both sides of a successful issue. Middle School Essay Templates and Formats A strong thesis should be touched — Right from junior school to when you do your PhD; always align that a good thesis tackles a scholarly issue. Immediately follow these topic selection tips, since they aspire the foundation of how to day a thesis statement in middle school. Enroll you prejudged the issue by answering loaded language. Those running for Grammar should be held to a higher education of ethical behavior. To write a middle school essay outline the first step is to identify the type of essay you need to write. Usually Middle school essays topics are designed to focus very specifically on a single story or to delve into one particular topic. Mastering how to write a thesis statement in middle school is an essential skill that every high school student ought to grasp. It is essential because you are making your first step into the world of essay writing, which largely revolves around thesis statements. A o-strong=" body paragraph helps to explain or prove your paper's main thesis. Your body paragraph should have: a topic sentence (a statement that supports. Thesis Statement - Lesson 4. Robin Daugherty from King's Ridge Christian School, Ga. Location: Research Paper Objective: The student will write a thesis statement for their research paper. Thesis Statement Examples High School Lesson Plan: How to Write a Thesis Statement written by: Trent Lorcher • edited by: SForsyth • updated: 3/23/ Essays without thesis statements are easy to grade: simply write an 'F' at the top of the paper, laugh, and shuffle up the next paper. You need good thesis statement examples for middle school to craft better thesis statements Most teachers award students marks for their essays and papers after reading their thesis statements. Although you may know how to write a good essay, you might not know how to craft a compelling thesis statement. How to write a thesis statement for a research paper middle school Rated 0/5 based on 29 review Tips on Writing a Good Thesis Statement at the Middle School Level | Synonym
1.918954
Zyphra/Zyda-2
things that Strieber definitely recalls is being placed in a Skinner Box and he feels that whatever was done to him as part of whatever conditioning or psychological experiment opened him up to communication with aliens later in life. The experience of being put inside a machine, the experience of being under the control or influence of a machine, is a common feature of psychotic delusions, of psychotic experiences, and here we start to venture into very murky, very dark and uncertain territory. Strieber also suggests that some of the memories that he has from this time in his life are of very disturbing, possibly atrocious things. The idea of satanic, sadistic cults carrying out atrocities can be a feature of psychotic delusions also, but at the same time that doesn't mean that satanic ritual abuse isn't something that could possibly happen to somebody. Likewise, being put in a Skinner Box and being subjected to psychological experiments isn't something that couldn't happen, and supposing it did happen, supposing an individual were subjected to being put in strange machines and having strange things done to them, or being the victim of ritual abuse, witnessing atrocities, those would be extremely distressing experiences very likely to produce in someone psychological trauma or possibly psychosis. And if that is the case then we find ourselves in an area where, by definition, it's almost impossible to say what's going on, what's real and what isn't. If you've intentionally subjected somebody to a situation like this then you've made the cause of their condition indistinguishable from the symptoms of it. You've in effect hidden what you've done to them at the same time as you've discredited any account that they might give of it. The story that Walter Bosley's father told him as a child, and this was many years after the events were supposed to have taken place, was that as a member of air force personnel his father had been sent as part of a rescue operation to Arizona. They were briefed that the military were aware of another civilization living in parallel with us on earth, a hidden civilization, and that from time to time there would be contact between us and them and that Roswell was actually one of the craft belonging to this other civilization crashing. So, Walter Bosley's father maintained that they were sent to Arizona because another craft had crashed and there was reason to believe that the pilots of this craft were alive and needed to be rescued, and what subsequently happened was a descent into a subterranean cavern and, unfortunately, coming into conflict with members of this other civilization, and one of the men with Bosley's father was killed during this altercation, and Bosley recalls that this is usually where the story would end with his father getting very emotional about what had happened. Having worked in intelligence himself, Bosley's theory is that his father had had some sort of false memory implanted. His father had been involved in some sort of secret mission, perhaps, and the powers that be had wanted to cover this up so they'd implanted this memory that no one would believe, no one could verify, and presumably this had been achieved by conditioning or traumatizing Bosley's father in some way. Bosley in the podcast suggests that Sidney Gottlieb, the head of the MK Ultra program was very interested in New Age thinking and also in myth and folklore, and also around this time we have The Schaefer Mystery: these were a series of stories published in science fiction magazines that developed a mythos of an underground civilization living in parallel with those of us dwelling above ground level. Bosley suggests that this may have been the reason why those particular memories had been implanted into his father, because that was the sort of stuff that Gottlieb was into. I've only done a little bit of searching, but I've not been able to confirm that Gottlieb was interested in those sorts of myths, but there is an interesting question here of why it does seem to be certain sorts of narratives, certain sorts of symbols and stories, that seem to prevail in this area, in this realm: the idea of a sinister, hidden group that has evil intention, that perpetuates atrocities against us, that hides in the shadows or literally lives underground in caves, that has technology superior to ours, that can influence us in strange ways that we don't quite understand. If the intelligence forces wanted to obscure what Walter Bosley's father had been up to then they could have chosen any sort of narrative. Why not unicorns and tigers? Supposedly they concluded that it was not possible to destroy the human mind, but maybe they did find ways to seriously obscure memories, the truth of the past. Or could it be that actually you don't need to implant a narrative at all. Could it be that these narratives lie close to hand in some sense, that they're part of the architecture of the mind? Razzaque suggested that when the mind is subjected to stress or trauma the ego inflates like a souffle – sort of blows up. Maybe it cracks along specific fault lines. Unlike spiritual practice, in trauma the ego doesn't willingly surrender, in which case it's having the experience of being invaded by something from outside itself. So, is it not understandable if that souffle has a specific flavour, which is the flavour of being in telepathic contact with aliens, of being subject to the influence and cruelty and atrocity of shadowy groups of people who are vastly more powerful than ourselves? What these narratives possibly might be is an image of trauma itself, seen from the perspective of the ego. That's why these narratives keep coming back, because they embody the story of the ego's forced dissolution. Strieber says something really interesting in his interview with Tsakiris and I'm going to quote it. He says: "Let me tell you something about black magick. First, it's quite real, and second, it's like flypaper. You touch it, you can never escape. An organization touches it, that organization is part of it. The more you try to escape from it the deeper you get." And then he says there's only one way to escape: "and that is to live a life of love, compassion, and humility. If you do not actively work on that you will not escape." It's interesting there, maybe, that what Strieber is advocating is a kind of spiritual practice. You need to live a life of love, compassion, and humility, he says, which is moving in the opposite direction that we talked about in Razzaque's model: finding a way to intentionally make the ego small, in contrast to having it smashed apart by unintentional forces outside of itself. The antidote to the horror of being invaded, Strieber seems to be suggesting, is to practise compassion, humility, love; to find ways to open yourself up intentionally to what's beyond the ego. He seems to be suggesting that that's the only way to cope with it and to transform it into another type of experience altogether. Still traumatic, of course, but bringing in an element of intentionality, of opening. So, we began by considering how awakening can sometimes lead into trauma, and where we've arrived at now is perhaps how trauma can lead into awakening, with Strieber talking about how he came to cope with his experiences by developing what is essentially a spiritual practice, exercising compassion, humility, and trying to find ways to accept the "visitors", as he calls them, into his life. But it's not that "acceptance" (to whatever degree that's achievable) means that there isn't pain and suffering involved in those visitations. What I wanted to turn to now is that other side of trauma turning into awakening, thinking back to the story that Walter Bosley's father talked about: the rescue mission in the caves and the hidden civilization that lived in the caves. It links up with the Schaefer Mystery that was in circulation around that time, but it also links up with the documentary series Hellier, which was released a few years ago. Hellier is a documentary record of a group of paranormal investigators who receive a series of emails from a guy based near or in the town of Hellier who sends through some evidence of visitations to his property by creatures that look like goblins or alien greys and which he suspects are coming from nearby cave systems. So, this group of paranormal investigators they go to investigate and over the course of two seasons of episodes they get drawn into an increasingly bizarre web of coincidences, connections, synchronicities, that lead them progressively into occultism – away from paranormal investigation into very much the occult world in which Aleister Crowley and ideas taken from his system of Thelema begin to feature more and more. And towards the end of the series, they find themselves drawn towards performing some kind of ritual in the system of caves that is designed to invite the god Pan back into the world. It's as if these sorts of narratives, these sorts of symbols, spontaneously create themselves, continue to re-echo, re-emerge. I must confess I've never actually taken the time to read his books, but Kenneth Grant also comes to mind: that same circle of ideas about threatening, dark forces and underground places and spaces, and alien intelligence about to burst into the world. They keep coming back, they keep returning. They're the very stuff of trauma and psychosis, and sometimes these ideas return as that, but we have to be careful with pathologizing them because, as we've seen, these sorts of images can be symptoms, but they can also be the causes of those symptoms. Trauma and psychosis are sometimes expressed through these images but these images, if they relate to actual happenings, could just as easily be the cause of those conditions. Somebody might end up with a memory of alien abduction due to traumatic experiences, or psychosis
1.283577
Zyphra/Zyda-2
The neck is the most flexible part of the spine and supports the weight of the head. The unique anatomical structure of the cervical vertebrae allows free movement of the head. The neck is also composed of muscles and ligaments. Any excessive stress on the ligament and muscles may injure or damage them. A sprain is a ligament injury caused by over stretching the ligament beyond its optimal capacity. It may even result in a ligament tear. A strain refers to damage to the muscle or its tendon when it is stretched beyond its capacity. In severe cases, it may even result in a muscle tear. Some of the most common activities and movements that may cause a stress on the soft tissues of the neck include lack of adequate warm up exercises prior to the sports, a fall, awkward position of the neck during sleeping, poor posture and spearing in football. Motor vehicle accidents usually result in severe sprains and strains called whiplash injuries due to sudden unexpected movement of the neck. A sprain or strain may result in neck pain, which may develop immediately after the injury or may present after a few hours or even days after the injury. The pain is usually intense and pounding in nature with a sudden onset. The pain may also radiate to the shoulder, upper back or arms. It may also be associated with muscle spasms. The affected region may be tender to touch with localized swelling and stiffness. Even slight movement of the neck can aggravate the pain. In rare cases, it may also result in loss of bowel or bladder function which is a medical emergency. Whiplash injuries are more severe neck injuries. They usually result in headache, dizziness, jaw pain and a ringing sensation in the ears. An accurate diagnosis is crucial for effective treatment of this condition. To arrive at an accurate diagnosis the doctor will inquire about your symptoms, time of their appearance and a history of any treatments employed previously. A medical history, physical and neurological examination are also essential for diagnosis. Neurological examination is conducted to identify any signs of neurological injury and involves evaluation of reflexes and muscle weakness. To confirm the diagnosis and to rule out other causes with similar symptoms an X-ray or a CT scan may also be performed. Rarely, an electromyography may also be ordered if an underlying muscle abnormality is suspected. Although the pain is excruciating, in most cases non-operative therapies are sufficient. Some of the non-operative therapies include rest, activity modification, medications such as muscle relaxant and intermittent application of ice pack followed by moist heat application. A neck collar may also be recommended for a few weeks to support the neck as well as to prevent any neck movement to potentiate healing. Non-steroidal anti-inflammatory drugs or NSAID's may also be prescribed to reduce the pain and swelling. Physical therapy, chiropractic or acupuncture may also be effective in some cases. TMI Sports Medicine and Orthopedic Surgery is associated with these premier facilities/organizations
2.220459
openbmb/Ultra-FineWeb
How a new compound promises to selectively activate hepatic glucokinase in a bid to treat type 2 diabetes. Jonathan James | | Longer Read Developing effective drugs to treat diabetes remains a challenge – despite a perception that everything is already invented, and that patients have the drugs they need. In truth, a good proportion of patients do not respond to current treatments (1). A new compound, described in Science Translational Medicine, may allow for selective activation of glucokinase (GK) – the key regulator of glycolysis – providing an alternative approach to current therapies. (2) Carmen Valcarce is a lead author on the paper and Chief Scientific Officer at vTv Therapeutics, the company driving the development of the new compound. Inspired by patients with persistent hyperinsulinemia hypoglycemia of Infancy (PHHI), many of whom have activating mutations in GK – she explains the rationale behind the approach. "We already knew about people who had reduced GK activity – they suffered from diabetes," she says. "But this was the first time that we really studied people with these activating mutations." This triggered new questions. Could a therapeutic be applied that would upregulate the activity of GK in patients with diabetes? The first step was to examine what had already been done. "We thought that the strategy that everyone at the time was following – targeting GK in the whole body (including the pancreas) was not the right approach," explains Valcarce. "We thought we should only target GK in the liver." The researchers began an extensive screen in the hope of finding a molecule that only activated GK in the liver – but that wasn't the only challenge. "We had to confirm whether our molecules were interfering with the normal physiological regulation by GK regulatory protein (GKRP)," explains Valcarce. "In parallel, we had to consider the effect our drug could have on lipid accumulation." Read the full article now Log in or register to read this article in full and gain access to The Translational Scientist's entire content archive. It's FREE! Or register now - it's free! You will benefit from: - Unlimited access to ALL articles - News, interviews & opinions from leading industry experts - NC Foster et al., "State of Type 1 Diabetes Management and Outcomes from the T1D Exchange in 2016-2018", Diabetes Technol Ther [Epub ahead of Print] (2019). PMID: 30657336. - A Vella et al., "Targeting hepatic glucokinase to treat diabetes with TTP399, a hepatoselective Glucokinase activator", Sci Transl Med, 11, 475 (2019). PMID: 30651321.
1.646633
m-a-p/FineFineWeb
Spy Physics: Using a Laser to 'hear' a conversation American Association of Physics Teachers Winter Meeting 2014 We will present a simply constructed laser experiment for students beyond their first year in physics. The goal of this particular experiment is to not only give students experience with laser interferometry, but to allow students to have greater excitement than they would normally get counting fringes or making precision measurements. Our experiment started when a student asked "Is it true that you could use a laser beam to detect a conversation in an office by its reflection off of a window." To accomplish this task we used a simple Michelson interferometer in which one mirror vibrated in response to a sound source. A speaker connected to a radio inside a small box with a tinted glass window served as a mirror for the laser beam and also represented the office that we were "spying upon." At present time, we have tried the experiment in two different ways. One in which the sound source is directly connected to the mirror (the easy version) and one in which the sound must propagate through air to vibrate the mirror (the harder version). We will demonstrate our results if the audio equipment is willing. Timothy Grove and Trunghieu T. Nguyen (2014). Spy Physics: Using a Laser to 'hear' a conversation. Presented at American Association of Physics Teachers Winter Meeting 2014, Orlando, FL.
1.962639
m-a-p/FineFineWeb
Welcome to our Materials category, dedicated to exploring the fundamental components that shape the built environment within the UK construction industry. Here, we delve into a wide range of construction materials, their properties, applications, and the innovative trends driving material selection. From discussions on sustainable building materials and advancements in construction technology to insights on material durability and aesthetics, our Materials category provides valuable knowledge for professionals and enthusiasts alike. Whether you're a builder, architect, or simply intrigued by the science behind construction, our articles offer a comprehensive understanding of the pivotal role that materials play. Join us as we navigate the world of construction materials, uncovering innovations that influence the resilience, efficiency, and design of structures across the UK.
1.502827
openbmb/Ultra-FineWeb
Reference method for measuring the surface tension of chromium electroplating: chapter 5 - 5.1 Samples for surface tension analysis must be taken from solutions at the representative operating temperature of the facility. The solutions should also be agitated for at least 10 minutes before the sample is collected. Agitation of the solution can be done either by conventional mechanical or physical means. Allow any foam (which may be present on the surface of the solution) to dissipate, such that a clear area of solution is present. This allows for collection of a sample without any surface foam being collected in the bottle or pipette. During the sampling process and as the sample is being collected, foam may be created in the bottle or in the pipette, which is acceptable. Note: foam collected from the surface of the solution can interfere with the true surface tension reading of the solution. - 5.2 Plating solution samples must be collected from at least 30 cm (12 inches) below the surface of the solution. - 5.2.1 One method to do this is to place a 100 mL or 200 mL pipette below the surface of the solution (to avoid collecting any foam) and collect the sample into the pipette with a bulb. If the sample is collected from below the surface of the solution, then foam is not likely to be present. - 5.2.2 Once the sample is collected from the tank, do not allow any sample to escape from the pipette and immediately transfer the sample from the pipette to a 200 ml or larger volume beaker. - 5.2.3 As an alternative to collecting a sample with a pipette, a sample container may be used. With this sampling method, use safety gloves (of sufficient length to protect the wearer) and dip the sampling container under the surface, with the opening of the sample container facing down. Slowly turn the sampling container right side up and pull the container straight up once filled with sample. - 5.3 Samples for surface tension must not be preserved chemically or physically. If samples are to be sent off-site for surface tension analysis, do not pack them in ice. Ambient cooling of the samples during transit is allowable as long as the samples are not cooled to below 10°C for more than 24 hours. Do not allow the samples to freeze. Report a problem or mistake on this page - Date modified:
1.731218
m-a-p/FineFineWeb
Melanotan 2 works by stimulating the release of the pigment melanin from the skin. Less UV exposure is necessary with Melanotan 2 compared to "normal tanning", and the tan that occurs with tanning injections is deeper and longer lasting than an individual's "normal tan". Melanotan works best (has the most noticeable effects) on people with fair skin tones. Expanding upon the possible anti-panic effects of 5-HTP, one study using 2mg/kg 5-HTP to children (3.2-10.6 years of age) at bedtime for 20 days noted that 5-HTP was asssociated with beneficial response (more than 50% reduction in night terror frequency) of 93.5% of children relative to 28.6% in placebo. Oddly, 6 months after the initial supplementation period the 5-HTP group still reported less sleep terrors (83.9% reporting improvement). The pore-forming subunit of the cardiac sodium channel Nav1.5 encoded by SCN5A is a critical determinant of myocardial excitability and conduction. Loss-of-function mutations in SCN5A can clinically manifest as progressive cardiac conduction disorders or as arrhythmic syndromes, such as Brugada syndrome. In addition to electrophysiological dysfunction, SCN5A mutations are also associated with myocardial fibrosis manifesting as global cardiomyopathy. In a 10-year old child exhibiting Brugada syndrome, the mutation SCN5AE555X was discovered. Therefore, cardiac sodium channelopathy pig models were generated by homologous recombination in the genetic background of outbred Yucatan minipigs via SCNT exhibiting the orthologous porcine heterozygous mutation SCN5AE558X. The heterozygous mutant animals were viable and fertile, and showed no sudden death over a 2-year monitoring period. They showed reduced SCN5A protein expression, which resulted in diminished total sodium conductance. The heterozygous mutant hearts showed slowed conduction and increased susceptibility for ventricular arrhythmias in the absence of structural defects of the myocardium or specialized conduction system. In total, a novel animal model was established for understanding the mechanisms linking sodium channel dysfunction to cardiac pathophysiology (Park et al., 2015b). According to recent research, this hormone "is now believed to be involved in a wide variety of physiological and pathological functions such as sexual activity, penile erection, ejaculation, pregnancy, uterine contraction, milk ejection, maternal behavior, social bonding, stress and probably many more, which makes oxytocin and its receptor potential candidates as targets for drug therapy. From an innocuous agent as an aid in labor and delivery, oxytocin has come a long way in being touted as the latest party drug."4 Six hours later, the mice were returned to cages with the aggressive mice. The mice that were missing their oxytocin receptors didn't appear to remember the aggressive mice and show any fear. Conversely, when mice with increased numbers of oxytocin receptors were reintroduced to the aggressive mice, they showed an intense fear reaction and avoided the aggressive mice. For now, Bartz isn't sure why oxytocin can have such different effects. Her most educated guess is that the hormone triggers a biased trip down memory lane. Under its influence, people are more likely to remember information about their mother that fits with their current attitudes to relationships. If they are anxious, they're more likely to remember the negative side of their early life. It's a reasonable enough idea, and one that Bartz intends to test in the future. It will also be good to repeat the study in a larger group – 31 men make for a relatively small study. Affecting generosity by increasing empathy during perspective taking. In a neuroeconomics experiment, intranasal oxytocin increased generosity in the Ultimatum Game by 80% but has no effect in the Dictator Game that measures altruism. Perspective-taking is not required in the Dictator Game, but the researchers in this experimental explicitly induced perspective-taking in the Ultimatum Game by not identifying to participants which role they would be in.13 Children: 5-HTP is POSSIBLY SAFE when taken by mouth appropriately. Doses of up to 5 mg/kg daily have been used safely for up to 3 years in infants and children up to 12 years-old. As with adults, there is also concern about the potential for eosinophilia-myalgia syndrome (EMS) in children, a serious condition involving extreme muscle tenderness (myalgia) and blood abnormalities (eosinophilia). Moreover, Tβ4 concentration revealed wide variability, and it decreased in the gingival crevicular fluid (GCF) as periodontal disease progressed . In contrast, Tβ4 mRNA expression was 3.76 fold higher in periodontitis-affected gingival tissue, compared with healthy individuals' tissue obtained from public microarray data (GEO assession: GSE 23586) . However, the Tβ4 mRNA level did not change in the periodontal-diseased gingival tissue (arbitrary units; 6.249) when compared with healthy tissue (arbitrary units; 6.242) (GEO assession: GSE 10334) . Although Tβ4 exerts anti-inflammatory effects in vivo and in vitro, the precise role of Tβ4 in the inflammatory response remains unclear. Exogenous Tβ4 can function like a hormone on cells in terms of its ability to modulate their biological behavior. Since one of the primary roles of Tβ4 in cells is the sequestration of actin monomers, and the protein is not secreted, previously indicated that it was unlikely that Tβ4 could have a hormonal function . However, other studies have shown that the intracellular level of Tβ4 or its mRNA can be significantly and rapidly altered by external stimuli and that change in the level of Tβ4 often are correlated with cell differentiation [18, 43]. In the present study, exogenous Tβ4 peptide activate intracellular Tβ4, which results suggested that exogenous Tβ4 spontaneously enter the cytoplasm through rapid internalization, and acts their functions same as endogenous one [8, 18]. Can a supplement proven to fight blue moods also help stimulate weight loss? "Yes it can!" say experts who are now prescribing a natural compound called 5-HTP. According to top integrative health expert Tasneem Bhatia, MD, author of What Doctors Eat ($15.99, Amazon), "5-HTP is converted directly to serotonin, and serotonin makes you feel good, feel happy, feel full — and when you feel that way, you're going to eat less." In fact, Dr. Bhatia adds that while most appetite suppressants only target physical hunger, this one also "works to reduce 'emotional hunger' and stress-related urges to eat." Dr. Oz said he left impressed after consulting with a panel of 5-HTP experts, including American Board of Obesity Medicine alum Denise E. Bruner, MD. He said the supplements may even be "a secret weapon for hunger!" In mammals, many mysteries remain. Oxytocin is difficult to measure reliably in the brain, making it hard to know exactly where, when and how much is normally released; nor do scientists understand precisely how it works to alter behaviour. "What we need to start thinking about is the more fundamental role that oxytocin plays in the brain," Young says. The determination to find out has been strengthened by a growing move in neuroscience to characterize circuits that are important in brain operations. "That's the level that's critical for understanding how the brain is regulating behaviour," says Thomas Insel, director of the US National Institute of Mental Health in Bethesda, Maryland, who has studied oxytocin in voles. Froemke's study1, published in April, showed that oxytocin temporarily suppresses inhibitory neurons — those that dampen neural activity — which allows excitatory cells to respond more strongly and reliably. "Our hypothesis is that the virgin brain is a blanket of inhibition, and that pairing the pup calls with oxytocin allows the network to be reconfigured," says Froemke. The hormone may serve to amplify incoming signals and allow them to be recognized as behaviourally important. (It is at least possible, he says, that this same mechanism could explain why some human mothers feel they are uniquely tuned to a baby's cries.) I am not a doctor and nothing I say should be taken as medical advice. If you have a read through the article, I would suggest following the recommendations there. If you want to go into detail book a consult at It turns out oxytocin is responsible for a lot more than just love. New science has found that this amazing molecule also influences how sociable each of us is, allowing us to 'tune in' to the social information around us, perceiving it in much higher resolution. Scientists are now applying this new knowledge in the lab, and as reporter Dr Graham Phillips finds out, they're discovering oxytocin's great potential to treat social disorders, like drug addiction and alcoholism
1.373788
m-a-p/FineFineWeb
Glucose is the primary vitality hotspot for the human body. The glucose sum in the blood is shown by the dimensions of sugar. When we eat, glucose enters our body and it is conveyed to our body cells. Hyperglycemia, or high glucose, normally shows up when the human body can't process the glucose appropriately, or it simply doesn't have enough measures of it and this is a condition known as sort 1 diabetes. The more drawn out the condition keeps going, the more noteworthy is the harm which should be possible to various body parts, particularly the kidneys, veins, eyes and the nerves. Individuals who experience the ill effects of this condition have expanded dimensions of glucose which is identified with various factors, for example, Abnormal amounts of pressure Diverse sicknesses, for example, a chilly What's more, children and youthful grown-ups can likewise encounter scenes of hyperglycemia in their pubescence or immaturity. High glucose indications On the off chance that your sugar levels are high, it doesn't really imply that you have diabetes, it is just one of the indications for it. Curiously, a few people with hyperglycemia don't have any side effects that point to it. Most normal high glucose indications: Incessant and evening pee Absence of fixation Moderate recuperating wounds Weakness and tiredness Dry and irritated skin Abundance stomach fat and weight gain Issues with the nerves The basic GI list demonstrates the quantity of carbs in nourishments which increment the dimensions of glucose and they can shift from 0 to 100. Look at this rundown of sustenances which have low GI file and will enable you to get more fit, so ensure you expend them day by day. Nourishments with a GI somewhere in the range of 0 and 54 are low Gi sustenances. You ought to eat them day by day. 1 egg – 0 one measure of hummus meets – 6 1 measure of broccoli – 10 one moderate sized yellow onion – 10 1 measure of walnuts – 15 one measure of fruits – 22 1 measure of cashew nuts – 22 one measure of yogurt – 23 1 Turkey wiener – 28 one measure of kidney beans – 31 1 measure of margarine beans – 34 8 ounces of tomato juice – 38 1 fair sized apple – 38 1 measure of spaghetti – 42 one measure of green grapes – 46 8 ounces of pineapple juice – 46 1 extensive carrot – 47 1 medium orange – 48 one extensive grapefruit – 50 1 extensive banana – 52 1 measure of peas – 54 Nourishments with a Gi somewhere in the range of 55 and 69 are be moderate GI sustenances, so you ought to devour them in like manner. 1 measure of dark colored rice – 55 1 tablespoon of crude nectar – 55 one measure of cereal – 58 1 measure of customary white rice – 64 1 serving of macaroni and cheddar – 64 High Gi sustenances are somewhere in the range of 70 and 100, and they can cause serious medical issues. Dodge these sustenances as much as you can! 1 cut of ordinary white bread – 70 2 measures of popcorn – 72 1 donut (coated) – 76 one rice cake – 78 1 fair sized prepared potato – 85 1 serving of corn chips – 92 50 grams of glucose – 100 In the event that you happen to encounter any of these side effects that demonstrate elevated amounts of glucose ensure you do the essential changes in your eating regimen, so you can keep up a sound equalization before things get confounded.
1.592061
openbmb/Ultra-FineWeb
Implementing top quality yeast is vital for successful ethanol distillation Heavy alcohols and spirits have to come through firmly through the distillation progression and producing reliable yeast is crucial for successful ethanol distillation. Ethanol or alcohol considering that it is more often identified is accessible in the form of different alcoholic beverages and is even attainable as biofuel through the classification of bioethanol, which is needed to power vehicles. As almost all mild beers and also wines literally use the brewing method in order to make alcoholic drinks which have low strength levels, stronger alcohols along with spirits like whiskey, brandy, vodka, etc are demanded to pass due to the distillation process to establish them with extraordinarily high proof levels. Just as before, although milder alcohols start using milder variations of the saccharomyces cerevisiae yeast, heavier alcohols require more robust variants that can go through in strong alcohols without dying, which therefore could end up in stuck fermentation. There are unique kinds of fermenting yeasts available in the market like the wine yeast, whisky yeast, vodka yeast, etc that help in unique ethanol production. Even so, these yeasts in the process are accessible in unique qualities and inferior yeasts possibly contain high quantities of wild yeast or other detrimental bacteria that could result in an inferior along with unsafe product. Impressive distillers together with home-distillers should have a form of super yeast that is enriched with useful micro nutrients that can supply tougher alcohol strength even at higher temperatures. Typical yeast can only participate in sugar fermentation at temperatures between 15 and also 27 degrees Celsius. They often become too sluggish or die the moment the temperature crosses these boundaries. Nonetheless, supercharged turbo variants of ordinary yeast that have been fortified with micro nutrients are there in the form of turbo yeast. This turboyeast can establish great ethanol fermentation that can provide a good base for ethanol distillation. The alcohol or ethanol derived after implementing turbo yeast is not merely more robust along with purer but is also higher in yield when compared to alcohol taken from common yeasts. The distillation method basically heats up the ethanol mixture to boiling point where several ingredients together with water as well as ethanol that have diverse boiling points are evaporated at diverse temperatures. The resultant vapors exceed due to a condensing unit the place they are cooled back into liquid form. Even so, the resultant powerful alcohol or spirit will be {good|amazing as long as the fermentation procedure has been carried out having powerful distillers yeast that creates stronger alcohols in the first place. No matter whether it is a vodka distillery, a whiskey distiller, a brandy distillery or even a bio enthanol plant, the point is that these types of units will be needing hardy yeast to assure that the fermentation process produces a high yield even against weak mashes. This will reduce the value of ethanol production and then supply alcohol with better color, acidity along with strength. Good quality yeast will also make sure persistence in production, which generally can strengthen the brand name of the product as well as the manufacturer. It is useful that the mixture that ends up at the distillation plant on its own is robust along with pure by nature with a view to produce heavier ethanol from it. Professional distillers and home-distillers really need to pick top quality yeast such as turbo yeast to ensure that the ethanol distillation method results employing ethanol which meets their objectives in terms of quality as well as quantity.
1.449573
Zyphra/Zyda-2
- Animal Allergies Allergies to animals are a common cause of rhinitis and asthma. Household pets (most often cats and dogs) are the principal cause of animal allergies, but other animals such as rabbits and horses or rodents such as rats, guinea pigs and hamsters are also frequent triggers of animal allergies. Allergy causing proteins from animals known as allergens are often found in public places such as schools or offices where animals are not normally permitted. These allergy proteins stick to clothing and shoes and can travel from place to place contaminating indoor environments. Dander (the skin that flakes off cats and dogs) gives rise to small airborne allergy particles which produce allergic symptoms when inhaled into the nose or lungs, or after coming in contact with the mucous membranes of the nose, throat or eyes. Saliva from pets may also be a source of allergen. Some people develop hives when licked by dogs. Rodents shed protein in their urine, which can be very allergenic. The urine becomes aerosolized and stays airborne for long periods of time. There is no such thing as a non-allergenic cat or dog. Some smaller species of dogs may shed less allergen in the indoor environment than a large hairy dog such as a golden lab or German shepherd. Some but not all studies suggest that frequent washing of cats or dogs may reduce the amount of allergen shed from the pet. - Make an Appointment _PHONE_
2.421672
Zyphra/Zyda-2
Accredited Licensed Fully Insured Bonded _PHONE_ LOCATIONS Neglect elderly why-do-seniors-sleep-so-much neglect elderly We've all seen our senior loved one sleeping through a family gathering, going to bed earlier, resting more. So, what is it about aging that brings more sleep? And, is it healthy to sleep that much? Learn more about how sleep benefits seniors and how to help your loved one maintain healthy sleep habits through age. BENEFITS OF SLEEP FOR SENIORS Getting a good night's rest is vital to good health and wellness at any age but the importance of sleep grows increasingly important as we age. Here are 10 benefits of sleep for seniors. 1. DECREASES RISK OF DEMENTIA Researchers believe that while we sleep the brain has a "waste removal" system that removes toxins in the brain, keeping our brains healthy. A study published in the Journal of the American Geriatrics Society found that sleep duration is crucial to preventing dementia and even premature death. Study authors conclude, "Given the beneficial effects of physical activity on risk of sleep disturbance, these findings indicate that not only maintenance of appropriate sleep duration, but also modification of lifestyle behaviors related to sleep may be an effective strategy for preventing dementia and premature death in elderly adults." 2. IMPROVES IMMUNE SYSTEM – Neglect elderly Sleep gives our bodies time to rest and fight viruses and infections that may be plaguing us instead of giving energy to all the other things our bodies need to do while we are awake. Rest is vital to staying healthy from viruses and colds since a lack of sleep suppresses the function of the immune system. Not only does sleep help prevent illness, but it also influences how we fight colds and viruses after we have them. Sleep allows our bodies to fight sickness best. 3. INCREASES EMOTIONAL WELL-BEING We've all seen a tired toddler. The effect that lack of sleep has on kids, is the same in adults and even in seniors. We may react differently to situations than a small child, but a lack of sleep makes us more irritable than if we had a good night's rest. 4. REPAIRS DAMAGED CELLS AND TISSUES Whether it's the brain or an injury, rest gives our bodies the time it needs to heal. When we sleep, our body goes to work repairing the damage the day has brought. Our bodies are able to rest on all other tasks and devote its energy to repair and restoration. 5. INCREASES LONGEVITY Too much or too little sleep is associated with a shower lifespan. One of the largest studies done on the relationship between sleep and longevity found that sleeping more than seven hours and less than five and half hours decreases longevity. 6. REDUCES INFLAMMATION Inflammation in the body is linked to chronic conditions like heart disease, stroke, diabetes, arthritis, and dementia. Sleep has been shown to reduce inflammatory proteins that are linked to these conditions. 7. INCREASES CREATIVITY – For Neglect elderly Creativity is crucial to healthy aging. From painting to writing and singing, creativity is a great outlet for seniors to express themselves, even if illness makes self-expression difficult. When we sleep, our brains reorganize and restructures memories and skills, resulting in more creativity and a new perspective. 8. HELPS TO MAINTAIN A HEALTHY WEIGHT Sleep has been linked to maintaining a healthy weight. Because sleep and metabolism are controlled by the same areas of the brain, hormones that make us sleepy are the same hormones drive the appetite. A study from the University of Chicago found that dieters who were well rested lost 56% more fat than participants who were sleep deprived and lost more muscle mass. 9. LOWERS STRESS Sleep is a great way to lower stress. Having a regular sleep routine can calm the body, improve concentration, regulate your mood, and even improve decision making. Sleep makes us better problem solvers, and we can handle the stress and anxiety from the day better with a good night's rest. Cognitive impairments from lack of sleep can give way to impaired job performance and relationship issues, causing stress. 10. REDUCES FALLS AND ACCIDENTS Sleepiness is an underrated problem with a huge cost. In fact, being tired behind the wheel can be just as dangerous as having an alcoholic drink and driving. A lack of sleep can decrease situational awareness and reflexes, causing falls and traffic accidents which can lead to more health problems in seniors. SENIORS AND DAYTIME NAPS The benefits of healthy sleep for seniors is extensive and while it may seem like seniors sleep more than the rest of the general population, the truth is that most seniors are getting less sleep than necessary during nighttime hours. Seniors, like younger adults, need 7 – 9 hours of sleep each night but most seniors are not getting that amount of sleep, leading to more daytime naps. So, what is keeping our senior loved ones from getting the right amount of sleep at night? Studies show that seniors take longer to fall asleep, show a decline in REM sleep, and wake more often during the night. In fact, 44% of seniors report experiencing one or more of the symptoms of insomnia. Additionally, seniors are more likely to have sleep disorders, like sleep apnea, restless leg syndrome, and even excessive snoring. However, other research suggests that medication prescribed to seniors for physical and psychiatric illnesses plays a large role in nighttime sleep disturbances and neglect elderly. Because many seniors are not getting quality sleep at night, many try and make up for their lack of sleep during the day. TIPS FOR HEALTHY SENIOR SLEEP HABITS – Neglect elderly There's no question that sleep is a major factor in health and wellness for seniors. So, how do you ensure your loved one is getting enough quality sleep at night? These tips can help set the right environment to improve rest and relaxation. - Exercise regularly, but not before bedtime. - Reduce caffeine intake, especially in the afternoon. - Review medications to determine if any are inhibiting sleep. - Modify the environment for better sleep to include blackout curtains, a sound machine, and a comfortable temperature. - Reduce screen time before bed, limiting blue light exposure. - Spend more time outside during the day. - Limit fluid intake before bed, especially alcohol. - Avoid irregular naps during the day. - Take a melatonin supplement. - See a medical professional to rule out any potential sleep disorders. How do you manage your sleep schedule? Have you seen the negative effects of sleep deprivation in yourself or a loved one? Share your experiences with us in the comments below.
2.28315
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
icon Simple interface for Graphviz python_graphviz_python310-0.20.1-3-x86_64 This package facilitates the creation and rendering of graph descriptions in the DOT_ language of the Graphviz_ graph drawing software (upstream repo_) from Python. Create a graph object, assemble the graph by adding nodes and edges, and retrieve its DOT source code string. Save the source code to a file and render it with the Graphviz installation of your system. Use the view option/method to directly inspect the resulting (PDF, PNG, SVG, etc.) file with its default application. Graphs can also be rendered and displayed within Jupyter notebooks_ (formerly known as IPython notebooks_, example <notebook_>_, nbviewer <notebook-nbviewer_>_) as well as the Jupyter QtConsole_. Nome python_graphviz_python310 Repositório HaikuPorts Origem do Repositório haikuports_x86_64 Versão 0.20.1-3 Tamanho da descarga 75.5 KB Código-fonte disponível Não Categorias Nenhuma Visualizações da Versão 11
1.192371
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
The importance of dissolved oxygen level in determining the platinum electrode potential in activated sludge has been clearly demonstrated by current-potential curves plotted at different oxygen concentrations. Tests have been carried out, in the laboratory and in full scale treatment plants,to define the relationship between the platinum electrode potential at equilibrium (Eh) and the dissolved oxygen [O2] concentration in the activated sludge. These two parameters obey a law of the form Eh = a + b log [O2]. The measured values of coefficents a and b differ widely to those found from the oxygen reduction reaction in water (a = 0.8 V at pH 7 and b = 15 mV per decade). Factors a and b mainly depend on the sludge loading, the aeration conditions and the sludge concentration. Using non–polished stationary platinum ring electrodes, the following values of a. were obtained (at pH between 7 and 7.6) : + 410 mV/NHE for sludge aerated for several hours without feeding, + 265 mV/NHE for over-aerated/low-loaded sludge (Cm = 0.2 kg BOD.kg MLVSS−1. day−1) and + 180 mV/NHE for high-loaded activated sludge in plug-flow system (Cm = 1 kg BOD.kg MLVSS−1.day −1). Factor b would seem to lie between 55 and 65 mV when the sludge is continuously aerated without feeding.At low loads with excess aeration, it lies between 70 and 90 mV. When the medium is slightly septic at low dissolved oxygen concentrations (insufficient daily aeration time, high sludge concentration or aerators shut down for too long periods), factor b increases and can reach 200 mV. In the same way, at high loads, factor b can become 150 mV. These results demonstrate the importance of dissolved oxygen concentration in the mechanisms which determine the metal electrode potentials in activated sludge. They also illustrate the role that other electroactive species play in the process. The type and concentration of these species depend on parameters such as the sludge loading, the overall oxygen supply, the aeration sequence and the sludge concentration.
1.833331
m-a-p/FineFineWeb
Nine Points to Help Reach Agreements There are hundreds of books and articles on the "art" of negotiation. Many of them are helpful, but too many are filled with war stories whose instructions may be hard to apply to your specific issue. Some people are natural negotiators. Through force of personality, an ability to read body language or intuition, these rare people are fun to know and watch. For the rest of us, training is necessary. This is the first in a series of occasional articles on negotiation strategy and philosophy. As a predicate, the assumption is that you want something that the other side does not want to give you. 1. Have an exit strategy It may sound strange that the top of the list is failure. The concept is critical. You simply cannot negotiate well unless you are willing to walk away, whether the object sought is an oriental rug or payment on a construction claim. If you are not prepared to walk, you make concessions too early and too often. Worse, you will lose the respect of your opponent, an extremely important component of success. 2. Closing the books This technique should be used cautiously. When the moment arises when you or the other side start to repeat arguments and it feels like you are going in circles, it may be time to test the other side's resolve. Literally, you slowly, and not in anger, begin to collect your materials and to close your books. Such actions give your opponent an exit. The response is often something along the lines of, "Hey, let's take a few minutes to cool off and then regroup." Translation: The other side wants to settle. If your opponent allows you to leave, see No. 1 above. 3. Partial settlements are important Try to get agreement on facts, even trivial facts, such as, "So we can agree that this is the contract," or "We agree the project started on time, Nov. 1; that the original completion date was June 1 and actual completion was Sept. 1." These partial agreements help focus the negotiation on the more serious issue of money. Write down all agreements and concessions even if the first meeting does not resolve all disputes. Have your opponent initial this list so that the second meeting (maybe with different people) does not start from scratch. 4. Goals For internal use only, list in the broadest terms your goals for the meeting. For example, your objective may be to settle a change order, get a time extension or convince your opponent of your professionalism and experience. The list will keep you from being diverted by unimportant matters and helps center the negotiations. List your specific goals on a separate sheet of paper. Each goal should be backed up by references to contract clauses, correspondence, daily reports, etc. In making these two goal lists, you will develop the secondary benefit of learning where your strengths and weaknesses lie. 5. The agenda Detailed agendas can be off-putting. The other side may feel that you are dictating. Also, the overly detailed agenda tends to be the first victim of negotiations and will get ignored, leaving the meeting unstructured. My experience is that broad topic headings are best (see No. 4 above). The typed agenda should have space for notes between the headings and should be sent to the other side with enough time for them to make additions. Add-ons by your opponent help with his or her buy-in of the concepts. 6. The cast The agenda or other outline for the meeting should cause both sides to disclose the cast of characters. Knowing your opponent's cast can help you predict the direction the negotiations will take. Will the meeting be attended by field people and project managers, who are usually quite detailed in their knowledge and approach, or will the meeting concentrate on the big picture with the financial officer and other company executives in attendance? Generally, your top decision-maker should not attend the first meeting or even subsequent ones, until his or her involvement is called for to reach a final resolution. 7. The range This issue is one of the hardest to face for the initial meeting. Certainly, your top executives, along with your attorney, should predetermine the dollar range for a settlement. I normally do not reveal that number to my entire negotiation team. If they knew, their tendency in negotiations might be to dive to the low end early and offer that "lowest acceptable settlement," which then, of course, becomes a ceiling and your actual settlement figure sinks from there. 8. Know your facts Too often, a negotiator will argue that the meeting should avoid getting too detailed. Without heavy preparation, your side, it is argued, will save time and money on lawyers and consultants. What are you really communicating when you say that? Actually, you are insulting your opponent and telling him that meeting is not worth any extended effort. A subsidiary to this strategy is that your team is all on the same page. The worst thing is a loss of credibility where your side disagrees with its own arguments and facts. 9. Concessions Take two passes at your negotiations, with a break in between. The first pass is your presentation and your opponent's rebuttal. A break after the first pass allows both sides to reassess, lick their wounds and decide what is worth fighting for. It is best if goals for the break itself are established so that it is recognized as a cooling-off period. Consider asking your opponent to break and then come back to address your position (see No. 1 above). Concessions should be made, if at all, after the break. Minor concessions at the second stage indicate your respect for your opponent and will increase your credibility. Do not concede on contract or legal points but only on very specific dollar values. Also, see No. 7 which concerns who on your team has advance information on your strategy. There is a lot more to successful negotiation, and I will write about it in future articles. These nine points are, in my view, a sound introduction to good negotiating. Treat them as crucial to developing your strategy for negotiations so you can achieve quicker, better and more lasting results. EC
1.277297
Zyphra/Zyda-2
skip to main content SciTech ConnectSciTech Connect Title: DENSITY AND ECCENTRICITY OF KEPLER PLANETS We analyze the transit timing variations (TTV) obtained by the Kepler mission for 22 sub-Jovian planet pairs (19 published, 3 new) that lie close to mean motion resonances. We find that the TTV phases for most of these pairs lie close to zero, consistent with an eccentricity distribution that has a very low root-mean-squared value of e {approx} 0.01; but about a quarter of the pairs possess much higher eccentricities, up to e {approx} 0.1-0.4. For the low-eccentricity pairs, we are able to statistically remove the effect of eccentricity to obtain planet masses from TTV data. These masses, together with those measured by radial velocity, yield a best-fit mass-radius relation M {approx} 3 M{sub Circled-Plus }(R/R{sub Circled-Plus }). This corresponds to a constant surface escape velocity of {approx}20 km s{sup -1}. We separate the planets into two distinct groups: ''mid-sized'' (those greater than 3 R{sub Circled-Plus }) and 'compact' (those smaller). All mid-sized planets are found to be less dense than water and therefore must contain extensive H/He envelopes that are comparable in mass to that of their cores. We argue that these planets have been significantly sculpted by photoevaporation. Surprisingly, mid-sized planets, a minority among Kepler candidates, are discoveredmore » exclusively around stars more massive than 0.8 M{sub Sun }. The compact planets, on the other hand, are often denser than water. Combining our density measurements with those from radial velocity studies, we find that hotter compact planets tend to be denser, with the hottest ones reaching rock density. Moreover, hotter planets tend to be smaller in size. These results can be explained if the compact planets are made of rocky cores overlaid with a small amount of hydrogen, {<=}1% in mass, with water contributing little to their masses or sizes. Photoevaporation has exposed bare rocky cores in cases of the hottest planets. Our conclusion that these planets are likely not water worlds contrasts with some previous studies. While mid-sized planets most likely accreted their hydrogen envelope from the proto-planetary disks, compact planets could have obtained theirs via either accretion or outgassing. The presence of the two distinct classes suggests that 3 R{sub Circled-Plus} could be identified as the dividing line between 'hot Neptunes' and 'super-Earths'.« less Authors: [1] ; [2] 1. Department of Astronomy and Astrophysics, University of Toronto, ON M5S 3H4 (Canada) 2. Department of Physics and Astronomy, Northwestern University, Evanston, IL 60208 (United States) Publication Date: OSTI Identifier: 22121843 Resource Type: Journal Article Resource Relation: Journal Name: Astrophysical Journal; Journal Volume: 772; Journal Issue: 1; Other Information: Country of input: International Atomic Energy Agency (IAEA) Country of Publication: United States Language: English Subject: 79 ASTROPHYSICS, COSMOLOGY AND ASTRONOMY; DEGASSING; DENSITY; HYDROGEN; MASS; PLANETS; PLANET-SYSTEM ACCRETION; RADIAL VELOCITY; ROCKS; SOLAR SYSTEM EVOLUTION; STARS; WATER
1.852648
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Stages The conventional wisdom is that the stages of a task should be pipelined, so you don't need to wait for the completion of one stage before the next is started. It surprises me that it seems you can sometimes do better when performing each stage of a pipeline in a short batch. Useful optimisation opportunities can arise from this phenomenon, with only minor code changes. I recently applied this principle to implement fast batch iterators in RoaringBitmap. I came across a discussion about shuffling arrays on Twitter, stimulated by a blog post by Daniel Lemire. Imagine you want to randomly shuffle the contents of an array. One approach to take would be to iterate over the array in reverse, at each index i, generate a random index j smaller than i, and swap the elements at i and j. Here's some benchmark code to measure how long this takes for an assortment of swapping strategies, including one where the swaps are just precomputed and looked up in an array. @Benchmark public void shuffle(Blackhole bh) { for (int i = data.length; i > 1; i--) swap(data, i - 1, op.applyAsInt(i)); bh.consume(data); } private static void swap(int[] arr, int i, int j) { arr[i] ^= arr[j]; arr[j] ^= arr[i]; arr[i] ^= arr[j]; } There is a large difference between the version where the random swap is precomputed and when the swap is computed on the fly with ThreadLocalRandom.nextInt. Benchmark Mode Threads Samples Score Score Error (99.9%) Unit Param: mode Param: size shuffle thrpt 1 10 2198.459182 274.965189 ops/s THREAD_LOCAL_RANDOM 65536 shuffle thrpt 1 10 1015.796005 16.225480 ops/s THREAD_LOCAL_RANDOM 131072 shuffle thrpt 1 10 7300.732038 46.788234 ops/s PRECOMPUTED 65536 shuffle thrpt 1 10 3828.021096 450.874537 ops/s PRECOMPUTED 131072 The difference is large, but a lot more work is being done when the random indices are computed on the fly. A good measure of efficiency per unit of work is cycles per instruction (CPI). Running the benchmark with -prof perfnorm shows that these benchmarks are at parity for cycles per instruction: if throughput is lower when the random numbers are generated on the fly, it's because there are more instructions to execute. Benchmark Mode Threads Samples Score Score Error (99.9%) Unit Param: mode Param: size shuffle:CPI thrpt 1 1 0.427028 NaN #/op THREAD_LOCAL_RANDOM 65536 shuffle:CPI thrpt 1 1 0.447793 NaN #/op THREAD_LOCAL_RANDOM 131072 shuffle:CPI thrpt 1 1 0.477202 NaN #/op PRECOMPUTED 65536 shuffle:CPI thrpt 1 1 0.565153 NaN #/op PRECOMPUTED 131072 Nevertheless, instruction profiling with -prof perfasm shows that the code is qualitatively different when computing the next swapped index is simple. When there is random number generation to do, most of the time is attributed either to mov or just after mov instructions (probably because of profiling skid) during the swap. For example, with the smaller array: 0.04% 0.00% │ ││ 0x00007fa009c0a8f9: xor 0x10(%rsi,%rdx,4),%r10d 15.31% 13.18% │ ││ 0x00007fa009c0a8fe: mov %r10d,0xc(%rsi,%rcx,4) 3.43% 3.05% │ ││ 0x00007fa009c0a903: xor 0x10(%rsi,%rdx,4),%r10d 5.37% 5.92% │ ││ 0x00007fa009c0a908: mov %r10d,0x10(%rsi,%rdx,4) 4.15% 4.22% │ ││ 0x00007fa009c0a90d: xor %r10d,0xc(%rsi,%rcx,4) 10.80% 8.80% │ ││ 0x00007fa009c0a912: cmp $0x1,%r9d ; probably skid The key difference in the precomputed case is that the loop is unrolled with several isomorphic chains of instructions. None of the loads seem to be quite so expensive according to the sampled frequencies. 0.08% 0.16% │ 0x00007fda2dc0dfb2: cmp %r10d,%r9d │ 0x00007fda2dc0dfb5: jae 0x00007fda2dc0e264 0.00% 0.00% │ 0x00007fda2dc0dfbb: xor 0x10(%rdx,%r9,4),%edi 2.90% 2.89% │ 0x00007fda2dc0dfc0: mov %edi,0xc(%rdx,%r11,4) 0.48% 0.33% │ 0x00007fda2dc0dfc5: xor 0x10(%rdx,%r9,4),%edi 0.45% 0.48% │ 0x00007fda2dc0dfca: mov %edi,0x10(%rdx,%r9,4) 0.56% 0.46% │ 0x00007fda2dc0dfcf: xor %edi,0xc(%rdx,%r11,4) 4.29% 3.88% │ 0x00007fda2dc0dfd4: mov 0x8(%rdx,%r11,4),%edi 0.03% 0.01% │ 0x00007fda2dc0dfd9: mov 0x8(%rsi,%r11,4),%r9d 1.38% 1.46% │ 0x00007fda2dc0dfde: mov %r11d,%ebx 0.02% 0.01% │ 0x00007fda2dc0dfe1: add $0xfffffffe,%ebx 0.63% 0.61% │ 0x00007fda2dc0dfe4: cmp %r10d,%r9d │ 0x00007fda2dc0dfe7: jae 0x00007fda2dc0e26f 0.00% 0.01% │ 0x00007fda2dc0dfed: xor 0x10(%rdx,%r9,4),%edi 2.60% 2.38% │ 0x00007fda2dc0dff2: mov %edi,0x8(%rdx,%r11,4) 0.58% 0.51% │ 0x00007fda2dc0dff7: xor 0x10(%rdx,%r9,4),%edi 0.90% 0.96% │ 0x00007fda2dc0dffc: mov %edi,0x10(%rdx,%r9,4) 0.68% 0.66% │ 0x00007fda2dc0e001: xor %edi,0x8(%rdx,%r11,4) 4.85% 4.17% │ 0x00007fda2dc0e006: mov 0x4(%rdx,%r11,4),%edi 0.01% 0.02% │ 0x00007fda2dc0e00b: mov 0x4(%rsi,%r11,4),%r9d 1.12% 0.95% │ 0x00007fda2dc0e010: mov %r11d,%ecx 0.01% 0.00% │ 0x00007fda2dc0e013: add $0xfffffffd,%ecx 1.02% 1.02% │ 0x00007fda2dc0e016: cmp %r10d,%r9d │ 0x00007
1.124641
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
(COLD WAR: 1945-49 – continued) Czechoslovak workers' May Day poster with hammer and sickle. In Stuttgart in early September, 1946, the U.S. Secretary of State, James F. Byrnes, announced a changed policy concerning Germany that also annoyed the Russians. Byrnes spoke of returning to the German people a centralized government, of helping Germany to recover economically, and he suggested that for the sake of fairness Germany's eastern border might be readjusted, returning to Germany some of the lands given to Poland. The Soviet Union was hostile toward any show of favoritism to Germany and remained focused not on Germany's economic recovery but on receiving more reparations. And France was also unenthusiastic about a German recovery. The winter of 1946-47 aggravated Europe's miseries. Hunger was accompanied by economic stagnation, inflation and political unrest. Economic crisis in Britain led the British government to ask the United States to assume the burden of overseeing affairs in Turkey and Greece, seen as a bulwark against Communist expansion southward. In Greece, a communist led insurgency was taking place, and the Soviet Union had been pressuring Turkey, interpreted in the United States as a threat to advance communism. [link] In March 1947, Truman responded with what became known as the Truman Doctrine, designed to contain communism. A grand strategy in foreign policy had been devised by the U.S. State Department, created by an experienced diplomat, George F. Kennan. He had been stationed in Moscow beginning in 1944, second only to the U.S. ambassador there, and he had interacted with Russians and with Soviet officialdom. Kennan had known the hostility to the West that Stalin was supporting. He disliked it, and he disliked talk of an inevitable war with the Soviet Union that could be heard among some in the United States. His strategy was for long range containment of Soviet power, patience and if possible the avoidance of all out war. His was the grand strategy that would prevail, willy-nilly, through a variety of administrations until the collapse of the Soviet Union and the end of the Cold War in 1989. Truman faced a Republican Congress, the Republicans having gained a congressional majority in the 1946 elections. Truman asked Congress for military aid for Turkey and for Greece. He spoke tough about the dangers of communism, believing as did an advisor or two that in order to get Congress to loosen its hold on the nation's purse strings it was necessary to scare people regarding the dangers of communism. In June, 1947, Truman and his new Secretary of State, George Marshall, began pushing what was called the European Recovery Program, which would become known as the Marshall Plan. The purpose of the plan was to create economic cooperation among the states of Europe and to stimulate economic growth in Europe. And there was some hope that creating hope and relieving misery would diminish the appeal of Marxist arguments and the appeal of communism among Europeans. The Soviet foreign minister, Molotov, welcomed the plan, arguing with his colleagues that everyone wanted reconstruction. But Stalin was suspicious. He described the plan as a ploy by Truman. "They don't want to help us," he said. "They want to infiltrate European countries." But he agreed to Molotov discussing it with Western diplomats. Yugoslavia, Poland and Czechoslovakia agreed to join in the U.S. plan for economic help, and Stalin recoiled, fearing the influence it would give the capitalist West in these countries. On July 3, 1947, in the middle of his discussions with Western diplomats, Molotov switched positions. He followed Stalin's leadership and accused the Western powers of seeking to divide Europe into two hostile camps. Czechoslovakia still had a coalition government, with a third of its cabinet Communists, reflecting the third of the vote that Communist candidates had won in 1946. Czechoslovakia's president, Eduard Beneš, was a liberal. Its prime minister, Klement Gottwald, was the head of the Czechoslovak Communist Party. Angry with the Czechoslovak government, on July 9, Stalin summoned Gottwald to Moscow. The Czechoslovak delegation returned to Prague on July 11, and after a long meeting among the full government it was announced that Czechoslovakia would cancel its decision to join the Marshall Plan. Czechoslovakia's foreign secretary, Jan Masaryk, was distraught. "I went to Moscow as the foreign minister of an independent sovereign state," he said, "I returned as a Soviet slave." [note] With Stalin against the Marshall plan, communists in Western Europe led street demonstrations against it. France's Communist Party made a bid for power. The labor unions it led went out on strike, calling for united action on the Left, for a 25 percent increase in wages and more bread. Millions supported the strike and through the autumn France remained economically paralyzed. The more conservative leadership of France's government expelled the government's Communist ministers. In September, in response to the Marshall Plan, the Soviet Union organized an international organization called the Communist Information Bureau (Cominform). Its invited members were the communist parties of France, Italy, Czechoslovakia, Poland, Hungary and Yugoslavia. The Communist Party USA was eager to join but uninvited. The Soviet Union's members proclaimed that the world had divided into two camps, one devoted to socialism and democracy and the other to reaction and war. The U.S. was described as imperialist and the Marshall Plan as an attempt to revive a German industry controlled by U.S. financiers. Communist Party representatives were urged to give up nationalism in favor of internationalism and were invited to confess their previous mistaken tactics. In December in France a passenger train derailed, killing twenty people. It was seen as the work of saboteurs supporting the labor strike. Public opinion was swinging against the strike. People were tired of it. A settlement was reached, labor winning a rise in wages, but less than the twenty-five percent originally demanded. The U.S. told the French that no Marshall Plan aid would be forthcoming until the threat from Communists within France was over. The popularity that the Communists had won from their fight against fascism and Germany was on the decline in France. Communists were losing in France, but in occupied Romania their domination of the government increased, and in December they forced the abdication of the king, Michael. Also in December, President Truman submitted the Marshall Plan to Congress, the plan involving $13.3 billion in aide from the U.S., which Congress had to approve. Week after week the debate in Congress dragged on. This was a Republican Congress, the first since the days of Herbert Hoover and the Great Depression. A significant number in Congress balked at pouring billions of dollars into "a bottomless pit of wasteful altruism." But then events in Czechoslovakia shocked them into loosening their hold on federal spending. Czechoslovakia had been suffering from especially bad harvests and unrest. Masaryk had appealed to the U.S. for aid but had been told that a loan would not be forthcoming until Prague changed politically. The Soviet Union promised Czechoslovakia 600,000 tons of grain to prevent starvation, and among the Czechoslovaks this won support for Stalin. With the arrival of the deputy foreign minister of the Soviet Union, supposedly to oversee the grain delivery, the government's non-communist ministers resigned, hoping to force an early election. In February, 1948, the Czechoslovak Communist Party organized street demonstrations and worker assemblies in factories. Units of communist-led armed factory workers marched. President Beneš feared civil war and allowed Gottwald to form a new government, and from a minority within a coalition government the Communists became the government. Headlines in the United States screamed takeover. The Secretary of the Navy proposed steps to prepare Americans for war. President Truman spoke to a joint session of Congress, blamed the Soviet Union for the takeover in Czechoslovakia and called it "a ruthless action." He called on Congress to pass the Marshall Plan and for the enactment of a universal military training and a Selective Service (conscription) bill. On April 3, Congress approved 5.3 billion for the Marshall Plan. In mid-April, 1948, sixteen European nations signed onto the Marshall Plan – now called the Organization for European Economic Cooperation (OEEC). Not joining were Czechoslovakia, Poland, Bulgaria, Romania, Hungary and Albania – places where Communists had considerable influence. Finland did not join either, wishing to avoid antagonizing the Soviet Union. Copyright © 2000-2011 by Frank E. Smitha. All rights reserved.
1.614051
HuggingFaceFW/fineweb-edu
URL="_URL_ size=233811 Content-Type: image/png Content-ID: <_EMAIL_> Content-Disposition: render Content-Description: Peter on his tricycle --zz993453-- 7. Security Considerations Any content indirection mechanism introduces additional security concerns. By its nature, content indirection requires an extra processing step and information transfer. There are a number of potential abuses of a content indirection mechanism: o Content indirection allows the initiator to choose an alternative protocol with weaker security or known vulnerabilities for the content transfer (for example, asking the recipient to issue an HTTP request that results in a Basic authentication challenge). o Content indirection allows the initiator to ask the recipient to consume additional resources in the information transfer and content processing, potentially creating an avenue for denial-of- service attacks (for example, an active FTP URL consuming 2 connections for every indirect content message). o Content indirection could be used as a form of port-scanning attack where the indirect content URL is actually a bogus URL pointing to an internal resource of the recipient. The response to the content indirection request could reveal information about open (and vulnerable) ports on these internal resources. o A content indirection URL can disclose sensitive information about the initiator such as an internal user name (as part of an HTTP URL) or possibly geolocation information. Fortunately, all of these potential threats can be mitigated through careful screening of both the indirect content URIs that are received and those that are sent. Integrity and confidentiality protection of the indirect content URI can prevent additional attacks as well. For confidentiality, integrity, and authentication, this content indirection mechanism relies on the security mechanisms outlined in RFC 4483 Content Indirection in SIP Messages May 2006 RFC 3261. In particular, the usage of S/MIME as defined in section 23 of RFC 3261 provides the necessary mechanism to ensure integrity, protection, and confidentiality of the indirect content URI and associated parameters. Securing the transfer of the indirect content is the responsibility of the underlying protocol used for this transfer. If HTTP is used, applications implementing this content indirection method SHOULD support the HTTPS URI scheme for secure transfer of content and MUST support the upgrading of connections to TLS, by using starttls. Note that a failure to complete HTTPS or starttls (for example, due to certificate or encryption mismatch) after having accepted the indirect content in the SIP request is not the same as rejecting the SIP request, and it may require additional user-user communication for correction. Note that this document does not advocate the use of transitive trust. That is, just because the UAS receives a URI from a UAC that the UAS trusts, the UAS SHOULD NOT implicitly trust the object referred to by the URI without establishing its own trust relationship with the URI provider. Access control to the content referenced by the URI is not defined by this specification. Access control mechanisms may be defined by the protocol for the scheme of the indirect content URI. If the UAC knows the content in advance, the UAC SHOULD include a hash parameter in the content indirection. The hash parameter is a hexadecimal-encoded SHA-1 [8] hash of the indirect content. If a hash value is included, the recipient MUST check the indirect content against that hash and indicate any mismatch to the user. In addition, if the hash parameter is included and the target URI involves setting up a security context using certificates, the UAS MUST ignore the results of the certificate validation procedure, and instead verify that the hash of the (canonicalized) content received matches the hash presented in the content-indirection hash parameter. If the hash parameter is NOT included, the sender SHOULD use only schemes that offer message integrity (such as https:). When the hash parameter is not included and security using certificates is used, the UAS MUST verify any server certificates, by using the UAS's list of trusted top-level certificate authorities. If hashing of indirect content is not used, the content returned to the recipient by exercise of the indirection might have been altered from that intended by the sender. RFC 4483 Content Indirection in SIP Messages May 2006 8. Contributions Sean Olson, _EMAIL_, provided the vast majority of the content of this document, including editorship through the first IESG review. Dean Willis touched it next. Eric Burger edited the document and addressed IESG comments, including the access protocol negotiation mechanism. 9. Acknowledgements Cullen Jennings and Nancy Greene provided a through review and valuable comments and suggestions. 10. References 10.1. Normative References [1] Freed, N. and K. Moore, "Definition of the URL MIME External- Body Access-Type", RFC 2017, October 1996. [2] Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045, November 1996. [3] Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types", RFC 2046, November 1996. [4] Fielding, R., Gettys, J., Mogul, J., Nielsen, H., and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2068, January 1997. [5] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [6] Daniel, R., "A Trivial Convention for using HTTP in URN Resolution", RFC 2169, June 1997. [7] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform Resource Identifiers (URI): Generic Syntax", STD 66, RFC 3986, January 2005. [8] Eastlake, D. and P. Jones, "US Secure Hash Algorithm 1 (SHA1)", RFC 3174, September 2001. RFC 4483 Content Indirection in SIP Messages May 2006 [9] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. [10] Burger, E., "Critical Content Multi-purpose Internet Mail Extensions (MIME) Parameter", RFC 3459, January 2003. [11] Rosenberg, J., Schulzrinne, H., and P. Kyzivat, "Indicating User Agent Capabilities in the Session Initiation Protocol (SIP)", RFC 3840, August 2004. [12] Braden, R., "Requirements for Internet Hosts - Application and Support", STD 3, RFC 1123, October 1989. 10.2. Informative Reference [13] Levinson, E., "The MIME Multipart/Related Content-type", RFC 2387, August 1998. Author's Address Eric Burger (editor) Cantata Technolgy, Inc. EMail: _EMAIL_ URI: _URL_ RFC 4483 Content Indirection in SIP Messages May 2006 Full Copyright Statement Copyright (C) The Internet Society (2006). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at _URL_ The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at _EMAIL_. Acknowledgement Funding for the RFC Editor function is provided by the IETF Administrative Support Activity (IASA).
1.947204
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Shopping Cart Your Cart is Empty There was an error with PayPalClick here to try again Alaska Herpetological Society USFS Public Use Cabin Logbooks This component of my citizen science research is considered "passive" because it allows interested individuals to contribute at their liesure without actively seeking their participation in a program with a defined time and place. It contains two components, amphibian specific logbooks and general logbooks as described below. Both methods are being analyzed as METHODOLOGIES for the collection of observational data and for the CONTENT of the data produced. If successful as a unique methodology, it is my hope that they can be expanded to include other taxa and other regions of Alaska. This initiative aims to engage public guest cabin users within the Wrangell Ranger District of the U.S. Forest Service (USFS) in the Tongass National Forest to contribute amphibian observations made during their stay. Participation has been sought through a series of amphibian specific logbooks which concurrently attempt to educate individuals on the amphibians of the region and responsible ways to interact with these species. The books explicitly state the goals of the project as well as the do and donts of participation. Each logbook (binder) contains: A total of twenty-three books have been distributed, one to each of the twenty-three guest cabins in the district. The map below (borrowed from USFS) combines all cabins within the Petersburg and Wrangell Ranger districts though only those within the latter are involved. These include: Anan Bay, Anan Lake, Berg Bay, Binkley Slough, Eagle Lake, Frosty Bay, Garnet Ledge, Gut Island #1, Gut Island #2, Harding River, Koknuk, Little Dry Island, Mallard Slough, Marten Lake, Middle Ridge, Mount Flemer, Mount Rynda, Sergief Island, Shakes Slough #1, Shakes Slough #2, Steamer Bay, Twin Lakes, and Virginia Lake. The books were placed in the spring and summer of 2011 and will be collected in the summer and fall of 2013, allowing them to have been in place for at least two amphibian breeding seasons. Given the difficulty of accessing these remote cabins, placement and collection is opportunistic. The observation pages of the logbooks will be analyzed for completeness and accuracy. Descriptive and inferential analyses of contributions as a function of guest cabin use and location will be undertaken. I will furthermore analyze species specific accounts, location specific encounters and demographic correlations. Additionally, a GIS project layer will be created to spatially represent contributed observations from this component and for the analysis of correlated data points. The idea for the amphibian-specific logbooks emerged from an unrelated scan of a general guest logbook at the Virginia Lake cabin during the 2010 pilot field season. At this time, I noticed that over a several year period cabin users had noted numerous encounters with amphibians. These observations sometimes included the weather, date, exact location, animal lifestage, sounds, and an animal description. The users unknowingly documented important observational data that can be used, when compiled with other data sources, to better understand local amphibian populations including the timing of spring emergence / chorusing, breeding sites, species diversity, distribution, etc. It occurred to me that this historical information is invaluable, available, but largely inaccessible. Visitor logbooks situated in public guest cabins are absent from scientific literature as sources of local knowledge and citizen science observations, though opportunistic scanning of these in the Stikine region suggests that in some cases these may contain decades of valuable environmental data, not just pertaining to frogs, but to many species, resources, habitats and climactic conditions. Essentially, cabin users have been unknowing participants of a long-term landscape-monitoring program for many years.They are currently located in the cabins that they were originally placed in and are at high-risk of being permanently lost at any time. In addition, these datasets are useless to researchers until an accessible and searchable database is established. Currently, these logbooks and the data that they contain are at high risk of being permanently lost in the event of fire, flood, or other unanticipated disaster. They have never been backed up, replaced, or digitized. The wealth of knowledge contained within their observational data is likely valuable to a number of scientific disciplines concerned with global change topics and the research costs necessary to obtain equivalent datasets through active sampling would likely cost hundreds of thousands of dollars. In addition, it would be difficult if not impossible to collect these data from the past, lending to the insurmountable need to preserve these resources. The USFS, though it supports the preservation and use of logbook data in the region, has maintained that logistical and financial constraints as well as the need to leave the logbooks in their respective cabins prevents the agency from pursuing such a project on their own. For these reasons, I am currently seeking funding to archive the data in each of these books into a searchable database that can be easily queried by subject. If successful, the use of visitor logs as databases could become commonplace as a result of this study and could lead to the acquisition of extensive data on many state and federal lands across the United States. For my own purposes, the resulting database will be queried specifically for amphibian observations and compiled with all other observational data. Featured Products Newest Members Recent Blog Entries
1.173023
Zyphra/Zyda-2
Today is Tuesday, June 12, the 164th day of 2012. There are 202 days left in the year. Today's Highlight in History: On June 12, 1942, Anne Frank, a German-born Jewish girl living in Amsterdam, received a diary for her 13th birthday; in it, she wrote, "I hope I will be able to confide everything to you, as I have never been able to with anyone, and I hope you will provide much support and comfort." (Less than a month later, Anne and her family went into hiding from the Nazis.) On this date: In 1665, England installed a municipal government in New York, formerly the Dutch settlement of New Amsterdam. In 1776, Virginia's colonial legislature became the first to adopt a Bill of Rights. In 1898, Philippine nationalists declared independence from Spain. In 1920, the Republican national convention, meeting in Chicago, nominated Warren G. Harding for president on the tenth ballot; Calvin Coolidge was nominated for vice president. In 1939, the National Baseball Hall of Fame and Museum was dedicated in Cooperstown, N.Y. In 1956, the Flag of the United States Army was officially adopted under an executive order signed by President Dwight D. Eisenhower. In 1963, civil rights leader Medgar Evers, 37, was shot and killed outside his home in Jackson, Miss. (In 1994, Byron De La Beckwith was convicted of murdering Evers and sentenced to life in prison; he died in 2001.) In 1967, the Supreme Court, in Loving v. Virginia, struck down state laws prohibiting interracial marriages. In 1972, the notorious porn film "Deep Throat," starring Linda Lovelace, opened in New York. (The title would become the nickname of a deep background source for The Washington Post during the Watergate scandal, later revealed to be then-FBI Associate Director Mark Felt.) Death claimed literary critic Edmund Wilson at age 77 and community organizer Saul Alinsky at age 63. In 1982, a crowd estimated at up to 1 million people gathered in New York's Central Park to demand a superpower freeze on nuclear weapons. In 1987, President Ronald Reagan, during a visit to the divided German city of Berlin, publicly challenged Soviet leader Mikhail S. Gorbachev to "tear down this wall." In 1991, Russians went to the polls to elect Boris N. Yeltsin president of their republic. Ten years ago: The Los Angeles Lakers finished off the New Jersey Nets in four games, winning their third straight NBA title with a 113-107 victory. Five years ago: President George W. Bush went to Capitol Hill, where he prodded rebellious Senate Republicans to help resurrect legislation that could provide eventual citizenship for millions of illegal immigrants. Afghan police mistook U.S. troops for Taliban fighters and opened fire, prompting U.S. forces to return fire, killing seven Afghan police officers. One year ago: The Dallas Mavericks won their first NBA title by winning Game 6 of the finals against the Miami Heat, 105-95. "The Book of Mormon" took home nine Tony Awards, including the prize for best musical; "War Horse" won five Tonys, including the best play award. Today's Birthdays: Banker/philanthropist David Rockefeller is 97. Former President George H.W. Bush is 88. Jazz musician Chick Corea is 71. Sportscaster Marv Albert is 71. Singer Roy Harper is 71. Pop singer Len Barry is 70. Rock musician Bun E. Carlos (Cheap Trick) is 61. Country singer-musician Junior Brown is 60. Actress Jenilee Harrison is 54. Rock musician John Linnell (They Might Be Giants) is 53. Actress Frances O'Connor is 45. Actor Rick Hoffman (TV: "Suits") is 42. Actor Jason Mewes is 38. Actor Michael Muhney is 37. Blues musician Kenny Wayne Shepherd is 35. Actor Wil Horneff is 33. Thought for Today: "It is easier to love humanity as a whole than to love one's neighbor." — Eric Hoffer, American philosopher (_PHONE_).
1.073272
HuggingFaceFW/fineweb-edu
The Great Federic Crusade Bird... Did we start a war? The Merinos Crest, as it is called in the Federation, is often regarded as one of the worst things that could happen in modern days regarding the interspecific relations between Birdkind and Humans. Even though it is often considered as a single war, the Federic Crusade could be more accurately described as a more or less uninterrupted series of conflicts, sometimes only related to one another by the ideologies opposing each other: the human suprematists, often related to extremist forms of the City Anima Cult; and the transentient egalitarians, who fight for the right and recognition of Perrots and other sentient species everywhere. Historical Significance - Over a case of a stolen relic, the Soul Observer of Beyforth, an army obeying to the Merinos Anima Cult attacks the Federation by itself. It promptly gets crushed by the federated forces. - This defeat represents a casus belli for a lot ofAnima Churches in the Temperate Band. Cities dominated by the Anima Cult either join forces to directly attack the Federation, or supply the Anima armies with food and weapons. - The all-out attack of the Bird federation causes a lot of tensions between bird and human communities in cities. A large schism occurs between Anima Cults that reject the sentience of Perrots and start enslaving them, and Anima Cults that don't. In some areas, bird rights that had been fought for are completely forsaken. It was a small trip for a bird, but a giant leap backward for Birdkind. - Merinos has become a land of urban warfare. Terror groups led by both birds and Anima cultists are fighting for the districts, the Merring delta watch is in shambles. - Over the years, the power balance shifts in favor of the egalitarians. Although it is weakened by the war effort, the Federation manages to survive its continuous assaults. At the same time, numerous local conflicts start in regions populated with defenders of the Anima attackers. Human supremacist groups are forced to spend most of their resources to deal with the local skirmishes. In both the Sheherp plains and the Middish Plains, birds start to organize themselves into independent groups. Joined forces of City and Tribal Birds use guerilla warfare to spread out their oponent armies. - 5555 AR represents a tipping point for the war. While it hadn't taken side in the war, the Moving Town of Irr starts to openly defend the Egalitarians. Now supplied with metal weapons, groups of perrots in the Sheherp and Middish plains organize a massive bird exodus toward allied city-states, and form nations that are absolutely capable to directly hold against the opposing religious powers. What is more, several smaller nations are tired of the war, and follow suit to Irr to help the federation. - In 5556 AR, a consortium of belligerents from diverse Anima cults gather with representatives of the Great Bird Alliance, and sign a treaty of peace. Once again, Birdkind is recognized as sentient by the Anima cults everywhere, and the Perrot territories on the Temperate Band are declared independent. The Soul Observer is given back to the Anima Cult of Merinos. Anima leaders that still defend human supremacy are arrested, and executed. - Conflict Type Start Date Ending Date Conflict Result Military and ideologic victory of the Federation Anima cultists: - 10,000 warrior-monks - ~50,000 conscripted soldiers from Merinos and Sheherp city-states Light Temple: - 16,000 warrior-monks Merinian terrorist groups: - ~7,000-10,000 guerilleros armed by the Merinos Common Cult and other religious groups. Other forces: - ~10,000-30,000 mercenaries - >50,000 guerilla troops Federic armies: - 5,500 highly trained professionnal soldiers - ~80,000 conscripted Perrot soldiers from the cities and surrounding farms Merinian terror groups: - ~5,000 guerilleros, Human and Perrots Independant guerilla armies: - At least 100,000 people, Perrots and Humans. Moving town of Irr: - No soldiers, but a massive supply of modern arms, armors, and vehicles. - ~6,000 Anima warrior monks - ~12,500 Guardians of the Circle warrior-monks - ~5,000 mercenary troops - >100,000 civilians and guerilleros - 26,000 Federic soldiers perished - 20,000 Federic civilians - >50,000 independant fighters - >65,000 other civilians Destruction of the Federation, increased control on intelligent birds in as much city-states as possible. Self-defense, recognition of bird rights all across the Cylinder Cover image: by Pouaseuille Please Login in order to comment!
1.776587
Zyphra/Zyda-2
Of course, the liquidation of any company is a very serious aspect. For this reason, different firms that are closing their businesses due to various circumstances such as bankruptcy is,Special education classes seem to be a necessity today as the number of children with special needs keeps increasing on a yearly basis. Transitioning to junior high school can be a awfully stressful period for any kid; for kids with learning difficulties diagnosed though,Structured learning can be great for a child; it can be a great way to help your child get the most learning done in the fewest possible years, Getting admission in these, colleges require entrances that are the basics for any engineering college. When a student is opting for iit coaching classes,In our daily lives, time is precious. You can become a successful student if you figure out a way to control your time and use smart study techniques that don't waste your precious time. Is a learning disability the same thing as dyslexia? You can Google a list of famous people who are dyslexic, but what exactly is dyslexia?Do you know how your memory works? Understanding how you learn and remember is critical to being a success. Memory has 5 steps from input to output. Someone who is LD usually has average to above average intelligence, but for some reason, that person is not able to perform academically at the level indicated by the IQ. You need to begin your chapter with a brief survey of the contents. Look at the bold print, read the headings, check out the pictures and captions. Universal Design is a concept that – in a perfect world – would enable those students with a disability to enter a room and immediately have EQUAL ACCESS to any and all information. If you want to be a successful college student, you need to have a studying plan. Your old habits from high school will probably not work in college. Distance education has come out as a prominent solution for students who have been trying to juggle between their work and education.Going from high school to college can feel like an overwhelming experience. If you are a student with a disability, the experience can seem rather challenging, but in reality, most colleges make the procedure easy to follow. Many students come to the college Disabilities Office and are puzzled by their struggle with math. They are perplexed by their inability to pass math, yet these same people are skilled in reading and writing. What these students do not always realize is that it is possible to have a learning disability in math but not have one in reading and writing. Read about Art competition and also read about marketing internships and paid summer internships Related Education Articles
1.965441
Zyphra/Zyda-2
Nocardia are aerobic and infectious (Nocardiosis), producing pulmonary disease, skin infections, lymphocutaneous lesions and brain abscesses (Mari et al, 2002; Shook & Rapini, 2006; Bennett et al, 2007). The genus contains approximately 15 known species. The species identified in human pulmonary and systemic infections include asteroides, pseudobrasilenisis, otitidis-cavriarum, abscessus, farcinica, nova, transvalensis (Georghiou and Blacklock 1992; Groves; 1997; Yourke and Rouah, 2003; Bennett et al, 2007; Kennedy et al, 2007). N. cyriacigeorgica recently was identified as an emerging pathogen in the U.S. and probably worldwide (Schlaberg et al, 2008). Lymphocutaneous, subcutaneous mycetoma with sulfur granules and superficial skin infections also occur (Shook and Rapini, 2007). N. asteroides was identified with pneumonia and empyema (thoracis) in a healthy 40-day-old neonate after presumed inhalation exposure (Tantracheewathorn, 2004). Nocardia are gram positive and stain partially with acid fast. Serological tests are not available. Predisposing factors are immunocompromised individuals, pre-existing lung disease, corticosteroid therapy and diabetes mellitus (Georghiou and Blacklock, 1992; Mari et al, 2001; Bennett et aI, 2007). As occurs with Streptomyces, the disease process can exhibit mimicry. Case reports of immunocompetent patients include brain abscesses (Chakrabarti et al, 2008; Kandasamy J et al, 2008; Dias et al, 2008), spinal cord abscess (Samkoff et al, 2008), mimicry of metastatic brain tumor (Kawakami et al, 2008), ventriculitis/choroid plexitis (Mongkolrattanothai et al, 2008), lymphangitis (Dinubile 2008), lung abscesses (Mari et al, 2001; Martinez et al, 2008 Tada et al, 2008), endophthalmitis (Ramakrishnan et al, 2008), and sternal osteomyelitis with mediastinal abscess (Baraboutis et al, 2008). It is recommended that 16s rDNA sequencing should be used to identify infections of novel bacteria (Woo et al, 2008). Mycobacteria are common in moisture-damaged building materials (ceramic, wood and mineral insulation), and their occurrence increases with the degree of mold damage (Rautiala et al, 2004; Torvinen, et al, 2006). They are environmental (soil, water, sewage), opportunistic gram positive bacteria capable of causing hypersensitivity pneumonitis as well as cervical lymphadenitis in children. Mycobacteria have been isolated from water systems, spas, hot tubs, and humidifiers and are resistant to disinfection (Primm et al, 2004; Torvinen et al, 2007). The CDC has implicated Mycobacterium avium, terrae and immunogenum in outbreaks of hypersensitivity pneumonitis (Falkinham, 2003a, b). M. terrae isolated from the indoor air of a moisture-damaged building induced a biphasic inflammatory response after intrathecal instillation into mouse lungs. There was an initial increase in TNF alpha and IL-6 at 6 hr. to 3 days, followed by a second phase at 7 to 28 days (Jussila et al, 2002a, b). The genus Mycobacterium consists of approximately 117 species of which 20 are potential human pathogens. They cause nontuberculous mycobacteria (NTM) lung disease (American Thoracic Society, 2007). Mycobacterium avium-intracellulare organisms are increasingly significant pathogens in North America causing a pulmonary infection named MAC (M. avium Complex). M. kansasii, chelonae and fortuitum are other important pathogens (Iseman et aI, 1985; Fujita et aI, 2002; Kuhlann and Woeltje, 2007; Fritz and Woeltje, 2007; Agrawal and Agrawal, 2007). According to the American Thoracic Society (2007), "The minimum evaluation for NTM should include the following: 1) Chest radiograph or, in absence of cavitation, chest high-resolution computed tomography (HRCT) scan; 2) Three or more sputum specimens stained for acid-fast bacilli (AFG) analysis; and 3) Exclusion of other disorders such as tuberculosis. Clinical, radiographic and microbiologic criteria are equally important and all must be present to make a diagnosis of NTM lung disease. The following criteria apply to symptomatic patients with radiographic opacities, nodular or cavitary, or HRCT scan that shows multifocal bronchiectasis with multiple nodules. These criteria fit best with Mycobacterium avium complex (MAC), M. kansasii, and M. abscessus. There is not enough known about NTM of other species to be certain that these diagnostic criteria are universally applicable to all NTM respiratory pathogens. A microbiologic diagnosis includes one of the following: 1) Positive cultures from two separate expectorated samples; 2) Positive culture from at least one bronchial wash; 3) transbronchial or other lung biopsy with mycobacteria histopathologic features. Patients suspected of having NTM lung disease but who do not meet the diagnostic criteria should be followed until the diagnosis is firmly established or excluded. NTM is on the rise worldwide. Mycobacteria have been isolated from water-damaged building materials from indoor environments. Finally, individuals treated with corticosteroids are at an increased risk. M. ulcerans is a significant human pathogen that causes Buruli ulcer (BU). Cases of BU have been reported worldwide with the greatest burden of disease occurring in West and Central Africa. Its transmission source is not fully understood, but it may be waterborne. The disease is characterized by progressive, severe necrotizing skin lesions that do not respond to antimicrobial therapy and may either require either surgical excision or amputation as treatment. M. ulcerans is an intracellular pathogen. It produces a polyketide-derived macrolide, mycolactone. Mycolactone is cytotoxic at 2 ng/ml, and is the organism's virulence factor. Mycobacterium scrofulaceum and kansasii and other mycobacteria produce a less cytotoxic (33 to 1,000 ug/ml) lipid chemical when tested on fibroblast in vitro (Daniel et al, 2004; Yip et al, 2007). The gram positive toxic organisms identified in indoor environments also include Bacillus spp, Nocardia spp. and Streptomyces spp. (Peltola et al, 2001a,b). Mycobacteria have been isolated from damp indoor environments (Jusilla et al, 2001, 2002a; Falkinham, 2003a, b). Examples of additional gram positive bacteria are species of Atrhrobacter, Bacillus, Cellumonas, Gordona, and Paeniibacillus (Andersson et al, 1997). Bacillus simplex and Amyloliquefaciens isolated from moisture-damaged buildings produce surfactin (Iipopeptide) and peptides that adversely affect cell membranes and mitochondria (Mikkola et al, 2004, 2007). Finally, there were elevated concentrations of Staphylococci and Actinomycetes in a water-damaged home in which a 3-month-old infant died from a Reye's-like syndrome with mitochondrial damage resulting in decreased enzymatic activity of complexes I-IV. Mitochondrial DNA mutation testing of the infant resulted in negative findings for known mitochondrial diseases. This home also contained several species of Aspergillus, Penicillium and S. chartarum (Gray et al, in preparation).
1.53594
m-a-p/FineFineWeb
, therefore providing secure anchoring. Afterwards, the ultrasound-applicator can easily be removed from the thread of the pin (Fig. 1). Fig. (1). SonicPin™ mounted on the ultrasound applicator and melted in the cancellous bone after activation by ultrasound. Fig. (2). Intraoperative view on a refixed fragment (screws). The arrows mark the osteotomie gap. Fig. (3). Exemplarily slices of the multiplanar CT reconstruction of the sheep knee implanted with screws (left), SonicPins™ (middle) and Ethipins® (right) showing three osteointegrated fragments of the distal femur condyle with the correspondent implant. Fig. (4). Scanning electron microscopy view of an osteosythesis screw from two different knees showing intact cartilage surfaces around the implant. The emerging screw head demonstrates the shrinkage of the refixed fragment. Fig. (5). Scanning electron microscopy view of the Ethipin®osteosynthesis screw showing intact cartilage surfaces around the implant. The scar-like parallel damages evolve from the surgical cutting of the implant during implantation are still visible after three month. Fig. (6). Scanning electron microscopy view of the SonicPin™ osteosythesis screw showing intact cartilage surfaces around the implants (the crack in the left picture arised during preparation). The right picture shows the look on the cartilage directly next to the removed implant. The Ethipin® consists of Polydioxanone and has a length of 40 mm and a thickness of 1.3 mm. In comparison to the SonicPin™, the Ethipin® had no cone or change of diameter. The ostoechondral fragment is fixed by the included K-wire. Afterwards the K-wire was removed and the Ethipin®was introduced into the hole using the included application shell. If the rest of the Ethipin®was raisedabove the surface of the cartilage into the joint, it was cut away with a surgical knife at the level of the cartilage. This procedure can lead to superficial cartilage damage, if not performed carefully and constitutes a difference to the competing implants (see Fig. 5). The Ethipin® is a provenimplant for refixation of osteochondral fragments. The handling of the Ethipin® is simpleand the resorption is good, but the stability, especially for traction forces, is only moderate [24-26]. The cannulated screws (Asnis™, Stryker, Schönkirchen, Germany) that were used had a length of 16 mm and a diameter of 2 mm. The screws had a self-cutting thread and consisted of titanium. Similar to the Ethipin®, this screw was applied over the K-wire that was positioned beforehand. The lowering of the whole screw under the level of the cartilage should prevent damage to the opposing joint surface. The study protocol was approved by the ethical committee of the Ministry for Nature and Environment of Schleswig-Holstein, Germany. In 16 Merino sheep, defined osteochondral fragments on the medial condyle of the femur were produced. The 16 sheep had a mean age of 1.5 years and a mean weight of 55.4 kg. Each hind leg of the sheep underwent surgery. The before performed biomechanical testing in laboratory and a power analysis led to a distribution of 16 SonicPin™, 8 Ethipin® and 8 screw applications. The choosen testing szenario should show the perfomance of th new SonicPin® technique versus the established refixation methods. In each sheep was at least one SonicPin® application performed, while the contralateral knee was treated with each of the conventional applications. The operation was performed under combined anaesthesia with Rompun® by intramuscular injection and a spinal anaesthesia with Carbostesin®. Both hind legs of the sheep were operated on. By a medial arthrotomy, the medial condyle was exposed and a defined osteochondral fragment (1 cm diameter and 4 mm thick) was produced by using a dedicated saw guide. This fragment was thenrefixated by the previously randomised implant type. Two implants were used on each osteochondral fragment. All implants used were implanted with a drill- guide which provided a 15° degree angle of the two implants to each other (Fig. 2). A softcast and a sterile bandage were applied after finishing the arthrotomy. After 5 days, the soft cast was removed. Full weight bearing for the whole time of the study was desired as a worst-case scenario. Analgesia was done by metamizol-enriched water for at least 14 days and then till no signs of protection of the extremities could be observed. Three months after surgery, the sheep were euthanised by an overdose of barbiturates, and the knees were dissectedfor examination. The computed tomography (MDCT) was performed using a 64-row Siemens Somatom Definition AS Scanner (Siemens Healthcare, Forchheim, Germany), with a gantry rotation time of 0.5 s, a collimation of 64 x 0.6 mm, slice thickness of 1 mm and slice increment of 0.8 mm. Image reconstruction was performed using a sharp, high-resolution kernel. The specific parameters for the MDCT were a tube voltage of 120kV, an effective tube current of 100 mAs and a pitch of 0.35. An automatic tube current modulation (CARE Dose4D, Siemens Healthcare) was not used. Subsequent image post-processing was performed on an IMPAX EE R20 VII dedicated workstation (Agfa HealthCare GmbH, Bonn, Germany). The effective radiation dose was calculated with CT-Expo V2.0© (Medizinische Hochschule Hannover). Image analysis was carried out by three independend experts; two experienced surgeons and one experienced radiologist. Image quality (IQ) was calculated on source images using line profile plots perpendicular to the longitudinal bone axis. For the evaluation of the overall diagnostic image quality, a subjective 5-point-scale was used by the readers as follows: 1= severest artifacts, bone structure not definable; 2 = severe artifacts, considerable blurring of the bone structure, cancellous structure can be noted; 3 = moderate artifacts, bone structure blurred, cancellous bone structure definable; 4 = mild blurring of bone structure, good separability of the cancellous bone structure; 5 = no artifacts, sharp image of bone and cancellous bone structure. The following features were evaluated: the fragment position, the margin of lysis around the implant, the effect on the opposing tibial surface, the bone density and the osteotomy gap. All these features were examined on axial source images and multiplanar reconstructions. The osteotomy gap and the margin of lysis were measured in millimeters. For the fragment position and tibial surface, a subjective 5-point score was used: 5 points were documented for the best results (fragment in original position and intact) and 1 point for the worst results (fragment destroyed, bare osteotomy site). For the tibial surface, 1 point meant that the cortical surface of the tibial plateau was completely perforated (identified by radiological proof of perforation of the subchondral membrane) whereas 5 points meant that no radiological affection on the tibial surface was observed. The points in between were documented for the erosion of the cortical bone of the tibial plateau in quarters. The bone density was measured in Hounsfield-units (HU) with a comparison of the fragment that was refixated(medial condyle) and the apposing area on the lateral condyle in each knee. After the CT scans, the cartilage surfaces were prepared for the scanning electron microscope. The preparations were fixed in a Monti-Graziadei solution (2% glutaraldehyde, 0.6% paraformaldehyde in 0.1 M cacodylatebuffer, at pH 7.2) for 2 days. The dehydration was performed by alcohol solutions of rising concentration (30, 40, 50, 60, 70, 80, 90 and 100% eachfor 15 min). After dehydratation, the samples were placed on an alloy tray and were treated with platinum. The examination itself was done with a Philips SEM 505 scanningelectronmicroscope (Philips, Eindhoven, Holland). The cartilage surface next to the implants (femur) was examined in by a qualitative description. Statistical Analysis The statistical analyses were performed using the Wilcoxon signed-rank test. SPSS software v20 (IBM, Ehningen, Germany) was used, and the level of significance was assumed to be p < 0.05. RESULTS Animals Two sheep died before the minimum survival time of 3 months due to pneumonia. In the end 14 knees could by examined with the SonicPin™ System, 8 knees with the Asnis™ scew system and 6 knees with the Ethipin® System. CT-Scans The quality of the scans was not compromised. All scans could be rated regularly and wererated to 4 or 5 points and were included into the analysis. The inter-rater reliability during examination of the CT-scans was high (Fleiss'K: 0
1.129952
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
A solid-state drive (SSD, also known as a solid-state disk) is a solid-state storage device that uses RAM to store data. SSDs have no moving mechanical components. This distinguishes them from traditional hard disk drives (HDDs), which contain spinning disks and movable heads. Compared with hard disks, SSDs are typically more resistant to physical shock, run silently, and have lower access time and lower latency. Fewer moving parts also typically result in lower power consumption and therefore better overall battery life in consumer laptops/netbooks. SSD - a storage device containing nonvolatile flash memory, used in place of a hard disk because of its much greater speed. "a decent SSD offers arguably the biggest jump in performance for your general PC experience"
1.029491
openbmb/Ultra-FineWeb
Thornewill and Warham Ltd was a metal hardware and industrial metalwork manufacturer, later an engineering company, based in Burton upon Trent, Staffordshire, England. Under different names it traded from 1740 until 1929, becoming a notable producer of steam engines and railway locomotives. It also constructed two footbridges across the River Trent in Burton. The Thornewill family were in the 'iron' business from at least 1732,when Thomas Thornewill (born 1691) was described as an 'Iron Merchant', and his son Francis at his marriage in 1767 was a "yeoman and edged-tool maker of Stretton". By 1740, Thomas and his brother Francis had established a business on the south side of New Street, making spades and other edged tools. The Earl of Uxbridge owned Clay Mill, which had been abandoned as a corn mill around 1730. In 1753 William Wyatt, the Earl of Uxbridge's steward, wrote that there was "nothing of any value remaining except the building and those in a very shattered and ruinous condition. I had a person with me to take the place in the conditions it is now in for a blade mill, that is, a mill for grinding all sorts of large edged tools and iron plates and for the plating of iron".In 1755 Thomas Thornewill took the lease of Clay Mill at an annual rent of 10 guineas. Thornewill spent over £300 on repairs to the building and its conversion into "a plating Forge for hammering and plating of iron into thin plates". The Clay Mills site was bought by Thornewills in 1786 for £3,220. In 1792 there is reference to "Mr. Thornewill, ironmonger, of Clay Mills, Stretton". By 1829 brothers John & Francis Thornewill, Iron Merchants and Iron and Brass Founders were established in New Street. John Thornewill died in 1836, and his brother Francis died unmarried in 1846, leaving the business in the hands of John's son Robert (born 22 January 1799). In 1849, Robert (aged 50) entered into a partnership with 29-year-old John Robson Warham (born 20 November 1820), an engineer from South Shields who joined the Thornewill company in about 1842,and the firm became Thornewill and Warham. Robert died on 16 July 1858, aged 59, and his share of the business (and the running of it) was taken over by his 52-year-old widow, Martha Hammond Thornewill, née Wright, from Eyam in Derbyshire. Until about 1845, the business was mainly a hardware firm making iron, copper and brass goods mainly used in the Burton breweries, but from 1845 onwards it became an engineering firm described as "iron and brass founders and steam engine makers", manufacturing engines for local collieries and breweries. By 1851 Thornewill & Warham was described as "Iron Merchants and Steam Engine, Machinery, etc. Manufacturers,"and employed 75 men and 25 boys. By 1861, they had 178 employees, mainly engaged in making colliery winding engines, and locomotives, providing the Burton breweries with most of their locomotives between 1860 and 1880; most of Bass & Co's 11 locomotives were supplied by the company. In 1868, a new partnership was formed, in which Martha Thornewill, now aged 62, held half the shares, her son Robert (now aged 25) five twelfths, and John Robsom Warham the remaining twelfth. Warham died of bronchitis on 26 March 1886 aged 66(and was buried in Stapenhill Cemetery); Martha died in 1889 aged 83, and her half-share in the business passed to her three sons, the other two of whom Robert bought out to become sole owner by 1893. By 1870 Thornewill and Warham was supplying steam engines to Scotland, London and South Wales, and after 1890 were exporting winding, pumping and hauling engines all over the world - to collieries, cotton mills, gold and diamond mines and waterworks in China, Japan, Borneo, India, South Africa, South America and Australia, at least 329 in all. Apart from the manufacture of steam engines, the company was also notable for its construction engineering: it provided and installed much of the ironwork in the Burton breweries between 1850 and 1890. In 1883 and 1884, the company built an iron bridge to replace a wooden footbridge connecting Burton to Andresy island. This led to the company's appointment to build a further bridge in the town.The construction in 1889 of Burton's Ferry Bridge and the connecting viaduct to Bond End, at a total cost of just over £10,000, was one of the firm's major achievements in that field, the bridge being designed by Edward William Ives (_PHONE_?), with assistance from Alfred Andrew Langley, chief engineer of the Midland Railway. Robert Thornewill, sole owner, died on 22 November 1914 aged 71; his only son, Robert Surtees Thornewill, was a clergyman in London's East End with no interest in engineering. Eventually, in 1919 Thornewill and Warham Ltd went into liquidation and a new company of the same name was formed.This was taken over in 1929 by a rival, S. Briggs & Co. Ltd. of Burton (today Briggs plc), a manufacture of brewery equipment. Burton's Ferry Bridge remains in service across the River Trent, having twice been renovated (in the 1970s and in 2015-2016), as does the nearby Andresey Bridge. Examples of Thornewill and Warham steam engines can be found in various museums and preserved buildings, including: Staffordshire is a landlocked county in the West Midlands of England. It borders Cheshire to the northwest, Derbyshire and Leicestershire to the east, Warwickshire to the southeast, the West Midlands County and Worcestershire to the south, and Shropshire to the west. Burton upon Trent, also known as Burton-on-Trent or simply Burton, is a market town in Staffordshire, England, close to the border with Derbyshire. In 2011, it had a population of 72,299. The demonym for residents of the town is Burtonian. Burton is 11 miles (18 km) southwest of Derby, 27 miles (43 km) northwest of Leicester, 28 miles (45 km) west-southwest of Nottingham and 20 miles (32 km) south of the southern entrance to the Peak District National Park. Richard Trevithick was a British inventor and mining engineer from Cornwall, England, UK. The son of a mining captain, and born in the mining heartland of Cornwall, Trevithick was immersed in mining and engineering from an early age. He performed poorly in school, but went on to be an early pioneer of steam-powered road and rail transport. His most significant contribution was the development of the first high-pressure steam engine. He also built the first working railway steam locomotive. The world's first locomotive-hauled railway journey took place on 21 February 1804, when Trevithick's unnamed steam locomotive hauled a train along the tramway of the Penydarren Ironworks, in Merthyr Tydfil, Wales. The Leicester and Swannington Railway (L&S) was one of England's first railways, being opened on 17 July 1832 to bring coal from collieries in west Leicestershire to Leicester. The Foxfield Railway is a preserved standard gauge line located south east of Stoke-on-Trent. The line was built in 1893 to serve the colliery at Dilhorne on the Cheadle Coalfield. It joined the North Staffordshire Railway line near Blythe Bridge. It is open at weekends and operates trains on Sundays, Bank Holidays and some Saturdays from April to October and Santa Special trains in December. Burton-on-Trent railway station is a mainline railway station located in the town of Burton upon Trent, Staffordshire, England. It is owned by Network Rail and managed by East Midlands Railway, although only CrossCountry services call at the station. Haigh Foundry was an ironworks and foundry in Haigh, Lancashire, which was notable for the manufacture of early steam locomotives. The Derbyshire and Staffordshire extension of the Great Northern Railway was an English railway network built by the GNR to get access to coal resources in the area to the north and west of Nottingham. The Midland Railway had obstructed the GNR in its attempts to secure a share of the lucrative business of transporting coal from the area, and in frustration the GNR built the line. The line was forked: it reached Pinxton in 1875 and a junction with the North Staffordshire Railway at Egginton, approaching Burton on Trent in 1878. The line cut through Derby, resulting in considerable demolition of housing there. Joseph Wilkes (1733–1805) was an 18th-century English industrialist and agricultural improver born in the village of Overseal in Derbyshire but more commonly associated with the village of Measham in Leicestershire. Ernest E. Baguley (1863–1948) was a British engineer. Michael Arthur Bass, 1st Baron Burton KCVO, known as Sir Michael Arthur Bass, 1st Baronet, from 1882 to 1886, was a British brewer, Liberal politician and philanthropist. He sat in the House of Commons from 1865 to 1886 when he was raised to the peerage as Baron Burton. The Bratch is an area of Wombourne in South Staffordshire, England, noted for its industrial heritage and more recently as a way station for walkers, riders and cyclists. Formerly, it was a small, separate hamlet, and became fully absorbed into Wombourne only in the 20th century. Population details for the 2011 census can be found under Wombourne. The North Staffordshire Railway (NSR) New L Class was a class of 0-6-2T steam locomotive designed by John H. Adams, third son of William Adams.
1.153675
m-a-p/FineFineWeb
Electropermanent magnet actuation for droplet ferromicrofluidics A team of researchers from Stanford University, Stanford, California have demonstrated magnetic actuation of microfluidic water droplets using miniature EPMs and oil-based ferrofluids. Water droplets, immersed in a continuous oil ferrofluid phase, experience a repulsive magnetophoretic force in the presence of an inhomogeneous magnetic field. EPMs, capable of generating strong magnetic fields and gradients, are used for the first time in microfluidic applications. Magnetic actuation is an attractive approach to microfluidic manipulation, given that strong magnetic fields can be applied on biological materials or fluids with negligible physiological impact. Despite its common use in passive microfluidic systems, there's been limited development of active magnetic actuation methods, mainly due to the limitations of conventional electromagnetic sources. EPMs combine the switching capability of electromagnets with the strength of permanent magnets in a compact package. In this work, Stanford researchers designed, fabricated and integrated EPMs with PDMS microfluidic chips. Using fast EPM activation (< 100 μs), forces up to 70 nN and displacement velocities up to 300 μm/s were achieved on 70 μm-diameter water droplets. The report appears in a forthcoming issue of the journal Technology. EPMs are a magnetic assembly consisting of two permanent magnets (one hard—very difficult to demagnetize, one soft—easy to demagnetize), two ferromagnetic poles, and a coil. To activate the EPM, a large 50 μs, 7 A current pulse is sent through the coil, inducing a magnetic field strong enough to reverse the magnetization of the soft magnet. By repeating this process with positive and negative current pulses, the soft magnet can be magnetized with equal or opposite magnetization as the hard magnet, thus turning the EPM ON or OFF, respectively. By using thin (350 μm) ferromagnetic poles, localized actuation regions can be achieved within the microfluidic channels. "Given their small, strong and switchable properties, EPMs can be used for active magnetic actuation in microfluidic systems, a method with many potential applications, but currently limited by existing electromagnetic sources," says José I. Padovani, the lead author on this paper. "The principal advantage of miniature EPMs over conventional electromagnets is that they require no static power to maintain the ON state, eliminating concerns about Joule heating of the fluid and excessive system power," says Prof. Roger T. Howe, Ph.D., Electrical Engineering Department, Stanford University. "In addition, these hand-assembled miniature EPMs have much higher switching speeds and higher field gradients than are feasible using planar microcoil electromagnets. Also, external electromagnets are capable of generating larger magnetic field strengths than is possible for planar microcoils, but their large size translates into much smaller magnetic field gradients and their larger inductance leads to slower switching times". EPM actuation was demonstrated on water droplets ranging from 20 to 85 μm in diameter. The magnetophoretic force for these droplets ranged from 5 to 70 nN, as the force scales with the droplet volume. Displacement speeds up to 300 μm/s were recorded and used to sort droplets in a Y-split sorting junction. These experiments were performed using the maximum EPM activation current. One aspect of the EPM operation that makes them really useful is that using lower activation currents, weaker magnetic fields can be obtained. The magnetic field was measured 600 μm away from the pole with a Gaussmeter at up to 23.4 mT, which translates into a magnetic field of about 300 mT at the edge of the pole. The Stanford team is currently developing new applications for EPM actuation in ferro microfluidic systems, as well as optimizing the EPM design. One area of current research is single cell manipulation and analysis using droplet microfluidics. "Magnetic field actuation is an ideal mechanism for live cell manipulation given that magnetic fields have no measurably harmful physiological effects over cells or the media suspension," says Prof. Stefanie S. Jeffrey, M.D., from the Stanford University's School of Medicine and co-author of the paper.
1.856143
openbmb/Ultra-FineWeb
How To Keep your Vehicle Protected Car theft in the U.S. costs vehicle owners over $5 Billion annually. While this number alarmed us, there are many little things you can do to make sure that you do not become a victim of this growing problem. - Stay Alert. Most of the times vehicles are stolen because you, the driver did something wrong. This could include: - Leaving your keys in the ignition, or in the car in general - Having a window open - Door or doors are unlocked - Left something valuable, visible in the car - Parking in dark, underpopulated areas - Don't leave kids unattended in car with or without the keys. Either way if your car is is stolen, precious cargo is inside. - Keep Vehicle Safe. You can do this simply by: - Parking in a garage - Use a horn alarm. - Utilize visible devices such as a steering-wheel lock, flashing lights or window etching. These things could deter thieves. - Immobilizing devices make it so thieves can't hot-wire your car successfully. - Vehicle recovery systems help law enforcement locate stolen cars. If you are too late and your car is gone, here is what you need to know: - Call the police and file a stolen-vehicle report. You need a case number to give to your insurance company. File a claim within 24 hours. Car theft happens every 45 seconds. Do not be a part of that statistic and keep your car, and yourself safe.
1.360207
openbmb/Ultra-FineWeb
TMEM16 proteins are found in all eukaryotes, with the family consisting of ten genes (TMEM16A-K, missing out I). Following TMEM16A and B being discovered as the elusive calcium activated chloride channels (CaCC) in 2008 by 3 independent groups (1, 2, 3) it was fully expected that all the other members of the family would also be CaCC's because of their high sequence similarity. However, this was not the case and TMEM16C-K have been shown to be phospholipid scramblases (4). So how do TMEM16 proteins on the one hand scramble plasma membrane phospholipids, and on the other hand operate as anion channels? In an attempt to answer this question Whitlock and Hartzell in their review (5) put forward a novel hypothesis: – - TMEM16A and B evolved from an ancestral scramblase. - TMEM16A pore shares structural similarity to an ancestral TMEM16 lipid channel. - The TMEM16A Cl– selective pore is formed not of pure protein, as ion channel dogma is conceived at the moment, but is composed partly of lipids. The authors propose that, TMEM16A protein stabilizes a non-bilayer phase in the membrane so that the 2 leaflets are continuous where they interact with the protein. The lipid head groups would then provide a hydrophilic environment forming half of the pore and ions could move across the membrane in the 'aqueous channel' formed between the protein and the lipid head groups. In putting forward this idea they have extrapolated Pomorki and Menon's proposed mechanism for scramblases (6), in which a hydrophobic furrow would allow the phospholipid head groups to translocate from one side of the membrane to another while the acyl chains remain in the hydrophobic phase of the membrane, and suggest TMEM16A has evolved to conduct Cl– ions but not lipids using the same conduction pathway. They draw their evidence from the recent X-ray crystal structure of fungal nhTMEM16 provided by Brunner et al. (4) and then using their homology models show TMEM16A has a hydrophilic furrow very similar to that of nhTMEM16 with the exception of a patch of hydrophobic amino acids at the cytoplasm end of the furrow. They suggest this patch might explain why TMEM16A is not a scramblase but an ion channel, because it forms a barrier to the movement of the hydrophilic head groups of phospholipids entering the furrow. This is strengthened with reference to mutagenesis experiments where a chimeric protein was made with 35 amino acids from the lipid scrambling domain of TMEM16F and substituted into TMEM16A which them became a scramblase (7). Suggesting this hypothesis might well be plausible, rather than as the title of Whitlock and Hartzell's review suggests a poor idea, however, it needs further investigation to prove it right or wrong. However, functional details remain obscure for most TMEM16 paralogs, making it unclear if they produce ion channels or not. If this novel hypothesis is proven, it will have a major impact on our perception of the dogma of proteinaceous ion channels and the discovery of further TMEM16A inhibitors. It might also explain why TMEM16A inhibitors are, as the authors suggest, somewhat weird and not the 'classical' channel blockers, as it is unclear whether the current TMEM16 inhibitors block by acting in the permeation pathway or allosterically. Blog written by Roy Fox - Caputo A, Caci E, Ferrera L, Pedemonte N, Barsanti C, Sondo E, Pfeffer U, Ravazzolo R, Zegarra-Moran O, Galietta LJV (2008) TMEM16A, a membrane protein associated with calcium dependent chloride channel activity. Science 322:590– - Schroeder BC, Cheng T, Jan YN, Jan LY (2008) Expression cloning of TMEM16A as a calcium-activated chloride channel subunit. Cell 134:1019– - Yang YD, Cho H, Koo JY, Tak MH, Cho Y, Shim WS, Park SP, Lee J, Lee B, Kim BM, Raouf R, Shin YK, Oh U (2008) TMEM16A confers receptor-activated calcium-dependent chloride conductance. Nature 455:1210– - Brunner JD, Lim NK, Schenck S, Duerst A, Dutzler R (2014) Xray structure of a calcium-activated TMEM16 lipid scramblase. Nature 516:207– - Whitlock JM and Hartzell HC (2016) A pore idea: the ion conduction pathway of TMEM16/ANO proteins is composed partly of lipid. Eur. J. Physiol. 468: 455-473. - Pomorski T, Menon AK (2006) Lipid flippases and their biological functions. Cell Mol Life Sci 63:2908– - Yu K, Whitlock JM, Lee K, Ortlund EA, Cui YY, Hartzell HC (2015) Identification of a lipid scrambling domain in ANO6/TMEM16F. Elife 4:e06901.
1.88732
openbmb/Ultra-FineWeb
Skip to main content The effects of knee arthroplasty on walking speed: A meta-analysis Patients with knee osteoarthritis patients have problems with walking, and tend to walk slower. An important aim of knee arthroplasty is functional recovery, which should include a post-operative increase in walking speed. Still, there are several problems with measuring walking speed in groups of knee osteoarthritis patients. Nevertheless, test-retest reliability of walking speed measurements is high, and when the same investigators monitor the same subjects, it should be possible to assess the walking speed effects of knee arthroplasty. The present study reports a meta-analysis of these effects. A total of 16 independent pre-post arthroplasty comparisons of walking speed were identified through MEDLINE, Web of Science, and PEDro, in 12 papers, involving 419 patients. For 0.5–5 months post-operatively, heterogeneity was too large to obtain a valid estimate of the overall effect-size. For 6–12 and 13–60 months post-operatively, heterogeneity was absent, low, or moderate (depending on estimated pre-post correlations). During these periods, subjects walked on average 0.8 standard-deviations faster than pre-operatively, which is a large effect. Meta-regression analysis revealed significant effects of time and time squared, suggesting initial improvement followed by decline. This meta-analysis revealed a large effect of arthroplasty on walking speed 6–60 months post-operatively. For the first 0.5–5 months, heterogeneity of effect-sizes precluded a valid estimate of short-term effects. Hence, patients may expect a considerable improvement of their walking speed, which, however, may take several months to occur. Meta-regression analysis suggested a small decline from 13 months post-operatively onwards. Peer Review reports Patients with knee osteoarthritis have problems walking, and tend to walk slower than controls. Functional recovery is an important aim of unicompartmental (UKA) or total (TKA) knee arthroplasty in patients with symptomatic osteoarthritis, and walking speed may be a useful variable for assessing the functional effects of knee arthroplasty. Over the last years, walking speed has received considerable attention in the literature. In elderly subjects, a decrease in comfortable walking speed may be a sign of co-morbidity [1], or even impending death [25]. In knee osteoarthritis, decreased walking speed is associated with joint space narrowing [6], increased concentrations of inflammation mediators [7], and pain [8]. After arthroplasty, walking speed is expected to increase [9], but in a longitudinal study, pain reduction did not lead to increased walking speed in knee osteoarthritis patients with new co-morbid conditions [10]. Hence, walking speed may not only be used as a simple instrument to monitor post-operative recovery, but also as a screening tool for co-morbidity. Unfortunately, there are problems in measuring walking speed in groups of knee osteoarthritis patients. Questionnaires are often used, but may be insufficiently valid, since post-operative patients tend to overestimate their own performance when pain has decreased [11, 12]. Clearly, walking speed needs to be assessed objectively. However, the methodology of walking tests has a major impact on results. Analyzing twin pairs, Pajala et al. [13] concluded that about half the variance of measured walking speed derived from the environment and the methodology of walking tests. In a review of clinical studies, Graham et al. [14] confirmed the latter point, and argued that "subtle differences in … instructions" (p. 870) may affect the results. In other words, even factors the researchers are hardly aware of, such as the timbre of a voice or clutter in the lab, may co-determine self-selected walking speed. Finally, there is the problem of the notion of patient "groups". As to the primary diagnosis, such a group may be homogeneous, but over 80% of knee osteoarthritis patients have one or more co-morbid conditions [15], most of which affect walking speed [16]. Hence, walking speeds in patient groups are almost certainly heterogeneous. There is a vast amount of literature on prognostic factors in knee arthroplasty. For instance, co-morbidity [17] and higher age [18] may slow down functional recovery, while UKA, in comparison with TKA [19], or the use of a clinical pathway [20], may speed up recovery. In response to all this heterogeneity, Ornetti and co-workers [9] expressed the belief that a valid meta-analysis of walking speed recovery after knee arthroplasty is presently unobtainable. Still, Ornetti et al. reported a mean increase in walking speed of 0.16 m/s (= 0.58 km/h), which is large enough to be clinically meaningful [10], and may well turn out to be statistically significant in meta-analysis. Test-retest reliability of walking speed is high, with most reported IntraClass Correlations (ICCs) at or above 0.9 [21, 22]. Thus, when the same researcher measures the same subjects repeatedly, using the same methodology, and within a reasonably short time interval, values will be similar. Still, in meta-analyses of the walking speed effects of arthroplasty, large between-study variance has to be expected. Meta-regression analysis was developed to deal with this problem, by pinpointing variables that contribute to this variance. The present study is a meta-analysis, including a meta-regression analysis, of the effects of knee arthroplasty on walking speed. We hypothesized a) large variance in the first period after arthroplasty (due to variability in post-operative recovery), but b) still a clear effect, which, however, c) would decrease after some time (due to co-morbid conditions or an increase in age-related diseases). Literature search In August 2009, a search was conducted in MEDLINE, Web of Science, the Cochrane Library, and PEDro, with combinations of the search terms: knee, osteoarthritis, walking, gait, velocity, speed, replacement, arthroplasty, and surgery. Full English reports were included of studies on knee osteoarthritis patients who underwent knee arthroplasty, with mean values and standard-deviations of preand post-operative walking speed. To decide on relevance, two members of our research group (H.A.-B. and H.R.F.-Y.) inspected titles and abstracts of all papers, and selected "eligible" studies [23], with reviewer agreement expressed as Cohen's kappa, and open discussion to resolve disagreement. Two authors (H.A.-B. and O.G.M.) read all eligible papers, established which papers contained the information needed, and made the definitive selection of studies included. Data description Two authors (H.A.-B. and O.G.M.) extracted all relevant data from the papers selected. The number of subjects was registered, plus potentially relevant variables—UKA vs. TKA, distance walked, gender (% male), age, BMI, and any measures of disease severity, co-morbidity, pain, or function. For all studies, self-selected (comfortable) walking speed (mean ± SD) before and after arthroplasty was entered. For descriptive purposes, absolute numbers were used. For walking speed, weighted means were calculated, with standard error of the mean as weighting factor. Since standard-deviations were not always given for age and BMI, these variables were weighted with the number of subjects per study. Effect-sizes (ES s) were calculated as [24]: E S = M post M pre S D pre where M pre is the mean pre-operative value, M post the mean post-operative value, and SD pre the pre-operative standard-deviation. The variance of the single-study ES is a function of the number of subjects, the actual ES, and the within-study correlation, r P, between preand post-values [25]. Unfortunately, papers rarely report this correlation, but it can be calculated from quantitative results of repeated measures tests. In the present study, r P was determined where possible. To establish if lower or higher values of r P would affect the conclusions, all procedures were subsequently rerun for correlations of 0.0 through 0.9. The overall ES was calculated using standard methods [26], and if the Q-statistic for heterogeneity was not significant, a fixed, otherwise a random effects model was applied. The significance of the ES was determined with a standard-normal Z-test [26]. The clinical literature suggests an initial improvement of function after arthroplasty [27], followed by a plateau [28], and after some time often [28], but not always [29], a decline. This pattern suggests that the short-term, mid-term, and long-term walking speed effects of knee arthroplasty should be differentiated. We plotted all effect-sizes over time, and used this plot to select cutting points between "short-term", "mid-term", and "long-term". To quantitatively determine heterogeneity, I 2 was calculated, i.e., the percentage between-study variance in the total variance of ES[30]. The literature suggests 25% as "low" heterogeneity, 50% as "moderate", and 75% as "high" [31]. Accordingly, if I 2 ≥ 75%, the overall ES was regarded as uninterpretable. Meta-regression was used to assess the impact of relevant factors on ES with high heterogeneity [32]. These
1.359986
Zyphra/Zyda-2
Plants have their own way to draw attention to grievances in care or diseases. Stunted leaves, discoloration and small fruits are a typical sign that the lemon tree is not well. Yellow leaves on citrus plants are a serious problem. The constant loss of foliage greatly weakens the plants and can lead to the death of the Mediterranean plants. Various causes can be the basis, if the leathery leaves of the citrus tree discolor and increasingly fall out in the main vegetation period. Passionate lovers of the Mediterranean plants should also not take lightly the weak formation of flowers and small fruits. Only those who recognize the cause in time and remedy the reason can save the perennial plant from further damage. If the discoloration is due to a care error, lemon trees need time to respond to the right measures. It can take up to 3 weeks before the plants show how effective the measures taken were. The following points can cause discoloration of the leaves: - a too dark location - lack of nutrients Citrus plants are evergreen plants, which only take a forced break in the cold season. The conspicuousness of the heat-loving plants can also occur in the winter quarters. The optimal supply of water Increasing, extensive discoloration of the foliage may be due to waterlogging. When it comes to watering, the lemon tree is very demanding. The evergreen plants are used to short periods of drought. Wet feet put a strain on the Mediterranean exotics and lead to a loss of foliage. Standing water at the bottom of the tub can promote infestation with tubular fungi. These pathogens cause root rot, which is feared by gardeners. The use of fungicides is ineffective in this case. Take the following tips to heart when supplying water: - Water as needed - Soil must be allowed to dry - Use water with a moderate lime content Among the most important preventive measures is a functioning drainage system. In the case of potted plants, this layer consists of porous material laid out at the bottom of the container. Excess water in planters and coasters should be drained out regularly. If you are brave enough and plant the lemon trees in the bed, you should mix the substrate with small pebbles or expanded clay. In this way, the soil will be permanently loosened and will not stick together even during severe drought. If yellowing occurs over a wide area, it is advisable to act quickly. Provided that root rot has not yet appeared in an advanced stage, the lemon tree can be saved. - Immediately stop the supply of water - transplant the plants into fresh, dry substrate The plants should be watered only with a greatly reduced amount of water for 2 to 3 weeks. When the foliage takes on its original color, the danger is over. Incidentally, prolonged drought can also cause discoloration. Another symptom: the young leaves curl up and wither. The upper tip of the index finger can be used to check whether the plant needs water. If the top layer of substrate feels completely dry, it is the optimal time to do so. The lemon tree belongs to the weakly feeding plants. However, the Mediterranean plant can only cope with a completely lean soil to a limited extent. Especially older plants in tubs, whose substrate has not been changed for a long time, suffer from nutrient deficiency. Chlorosis is a form of iron deficiency, which is impressively manifested by a yellowish discoloration of the leaf veins. Small flowers and crippled shoots are further signs of a lack of nutrients. - use fertilizer containing iron - use in the main vegetation period - repot potted plants annually or replace substrate Fertilize according to the package instructions. Excessive supply of iron-containing nutrients can have the opposite effect on the lemon tree. The plant does not recover, the roots of exotics are not able to process the high concentration of fertilizer. In the winter months, the plant does not need nutrients. Here is often another underlying cause, when the plant discolors and loses its foliage. Besides chlorosis, there are other characteristic signs of nutrient deficiency. A cloudy coloration of the leaves is an indication of a zinc or magnesium deficiency. It is advisable to fertilize the lemon tree in a varied manner. The main treatment measure for an undersupply of nutrients. - transplant the plant into soil rich in humus - immediately start feeding the plant with fertilizer Recognize pests in time Infestation with harmful insects alone in rare cases "only" causes yellowing of the lemon tree. Most often it is gray or black spots on the leaves, which brings a visit of aphids and mites. If the surface of the plant is sticky, you should still take a closer look at the citrus plant. A large proportion of cell sap-sucking pests prefer to colonize the underside of the foliage and shoot axils. - water with nettle broth - wipe affected parts of the plant - increase humidity For houseplants, setting up special pheromone traps has proven effective. Due to the sticky surface of these prepared products, there can be a strong decimation of the pests. Unlike the other causes, which are responsible for the discoloration of the leaves of the lemon tree, harmful insects pose a danger to neighboring plants. If space allows, the affected plants should be quarantined. Leaves that have fallen off or been removed belong in the trash, not in the garden compost. The wrong location The lemon tree is a sun-hungry plant. In the bright winter garden, the Mediterranean perennial feels at home. The plant also thrives on a sunny balcony and in a light-filled rock garden. A lack of light can cause noticeable characteristics on the leaves. - Avoid half-shady locations - dark places are unsuitable for the citrus plant - avoid proximity to shade-giving plant neighbors As with a pest infestation, the external characteristics of a lack of light rarely show up only in the form of yellow spots and leaf loss. Treat the plant to a sunny location and check to see if any other factors may be responsible for the abnormalities. There is a well-known saying that prevention is more effective than treating the cause. This statement applies exactly to the citrus tree. Cultivation of the Mediterranean plant is not complicated, but still a few important requirements must be met in its care. - choose the right location - water only in small quantities - the plant tolerates small amounts of lime - provide fertilizer from March to August - increase the humidity - check the citrus tree for pests These points can be easily implemented and sustainably promote the health of the citrus tree I have 30 years of experience and i started this website to see if i could try and share my knowledge to help you. With a degree a Horticulture BSc (Hons) I have worked as a horticulture specialist lead gardener, garden landscaper, and of course i am a hobby gardener at home in my own garden. Please if you have any questions leave them on the article and i will get back to you personally.
2.281568
m-a-p/FineFineWeb
The probability of survival was slightly higher with the restrictive strategy than with the liberal strategy in the subgroup of patients who had bleeding associated with a peptic ulcer (hazard ratio, 0.70; 95% CI, 0.26 to 1.25) and was significantly higher in the subgroup of patients with cirrhosis and Child–Pugh class A or B disease (hazard ratio, 0.30; 95% CI, 0.11 to 0.85), but not in those with cirrhosis and Child–Pugh class C disease (hazard ratio, 1.04; 95% CI, 0.45 to 2.37).Historically, patients who come in with massive GI bleeds due to ulcer disease are aggressively resuscitated with blood products and saline until they achieve hemodynamic stability (and if not, it's off to the OR). The decision to transfuse blood typically was a clinical decision, not one driven primarily by arbitrary hemoglobin counts. The real life applicability of these findings is somewhat dubious. In an emergency situation, when a patient is hemodynamically labile in the ER and you aren't certain of the past medical history and blood is spewing out in torrents like the hallways in the Shining, it's tough to sit around and wait for the lab to run a CBC before deciding whether to thaw some blood or not. From recent wartime experiences, we know from the trauma literature that outcomes are superior in those patients who are aggressively resuscitated with blood products early and often. It just doesn't make a whole lot of sense to delay treatment of a potentially exsanguinating patient based on an arbitrary laboratory result cut-off. Certainly, the game changes once a patient has stabilized. There's no reason to transfuse a HgB of 8.7 for the mere fact that 8.7 is less than 9. I'll stick with the old standby of "clinical judgment", thank you very much.
1.240433
openbmb/Ultra-FineWeb
ICD-10-CM H66.90 is grouped within Diagnostic Related Group (s) (MS-DRG v38.0): 152 Otitis media and uri with mcc. 153 Otitis media and uri without mcc Middle Ear Infection (Otitis Media) Medically reviewed by Karen Gill, M.D. A middle ear infection (otitis media) occurs when a virus or bacteria cause inflammation in the area behind the eardrum Myringotomy in Non-Complicated Acute Otitis Media Analysis of the results in study I47 emphasizes on experimental grounds the clinical data published elsewhere4,5,49 in which myringotomy does not contribute to a faster healing of inflammation during AOM. Furthermore, at the structura Otitis media, unspecified, right ear. H66.91 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2021 edition of ICD-10-CM H66.91 became effective on October 1, 2020 Otitis media is one of the most common causes of fever as a presentation in the pediatric population. Chronic suppurative otitis media, also known as chronic otitis media, is a stage of ear disease in which there is an on-going chronic infection of the middle ear without an intact tympanic membrane. This disease is a chronic inflammation of the. In the later stage called acute purulent otitis media, pus fills the middle ear cavity. When pressure builds up, the eardrum may burst. The pus and blood will then drain out. This condition is sometimes called ear abscess. If otitis media goes on long enough or recurs several times, a chronic condition called otitis media with effusion develops Strep throat and Otitis media - Otitis media is a condition of severe inflammation of middle ear. It is reported that these kinds of symptoms are noticed as a progression of bacterial or viral infections that cause sore throat Otitis Media can be classified as: Acute: When the duration of the disease lasts from 0 to 3 weeks. Sub acute: When the duration is for 3 to 12 weeks. Chronic: When the duration is greater than 12 weeks. Symptoms There are different stages of Otitis Media and symptoms will vary depending on the stage as follows: Stage of Hyperemia Stage of. Acute otitis media occurs in both children and adults but more often occurs in children, especially in children aged 6 - 36 months. Risk of illness is high when children use unhygienic items, drink while lying down, have been exposed to polluted air, cold air, or after an upper respiratory tract infection PPT - Assessment of the tympanic membrane PowerPoint Acute otitis media (AOM) is a very common condition with significant medical, social and economic negative impact. 1-4 At the age of 1 year, 25%-36% of children have already had at least 1 episode of AOM and approximately 20% of children develop recurrent otitis. 5, Ear infections occur in various patterns. A single, isolated case is called an acute ear infection (acute otitis media). If the condition clears up but comes back as many as three times in a 6. Otitis media accounts for approximately 20 million annual physician visits. Various epidemiologic studies report the prevalence rate of acute otitis media to be 17-20% within the first two years of life. One-third of children experience six or more episodes of otitis media by age 7 years. Peak prevalence of otitis media in both sexes occurs in. Asom Acute otitis media : causes, symptoms, diagnosis acute otitis media is difficult to obtain in developing countries such as the Philippines due to the massive human and logistic resources needed to collect data as a population-based study. Acute otitis media is a disease resulting from a bacterial infection, more commonly by Streptococcus pneumoniae Key words: acute otitis media, facial oedema, proptosis, mastoiditis, zygomatic arch INTRODUCTION Acute Otitis Media (AOM) is a common localised infection in childhood which responds well to conventional treatment with antibiotics and rarely causes serious complications. In a few cases, the disease might cause several intra- or extra-tempora The signs and symptoms of acute otitis media vary with the stage of the disease. Stage of tubal occlusion - Features of acute coryza is observed with running nose and sneezing. The patient complains of fullness of the affected ear with mild pain and hearing loss. This stage usually passes unnoticed in childre 13 Unit Four: Middle Ear Disease Diagnosi Handling Acute Otitis Media. Elements of the definition of acute otitis media (AOM) are all of the following: Recent, usually abrupt, onset of signs and symptoms of middle-ear inflammation and MEE. The presence of a middle ear effusion that is indicated by any of the following: Bulging of the tympanic membrane Introduction. Acute Otitis Media (AOM) presents over a course of days to weeks, typically in young children, characterised by severe pain and visible inflammation of the tympanic membrane.The patient may also have systemic features, such as fever and malaise. Although AOM is a common condition in young children, it can affect all age groups, including neonates Clinical Practice Guidelines : Acute otitis medi Acute otitis media (AOM), also called purulent otitis media and suppurative otitis media, occurs frequently in children. It is the most common diagnosis for which they receive antibiotics . The treatment of uncomplicated AOM will be reviewed here. The epidemiology, pathogenesis, diagnosis, complications, and prevention of AOM are discussed. Children with acute otitis media may also suffer from upper respiratory tract infection, ear tugging, hearing loss and disturbed sleep. Otitis media with effusion: It is also known as serous otitis media or glue ear. An accumulation of fluid (effusion) occurs in the middle ear channel in this case Acute otitis media (AOM) is an infection of the middle ear fluid that is almost exclusively found in young children. It is usually caused by bacterial infections but can be viral as well. Streptococcus pneumoniae, non-typeable Haemophilus influenzae, and Moraxella catarrhalis are the most common bacterial causes Mnemonics – ONESTOPNURSING Background: Acute otitis media (AOM) often occurs as a complication of upper respiratory tract infection (URI).. Objective: To describe otoscopic findings during URI, the full clinical spectrum of AOM, and outcome of cases managed with watchful waiting.. Methods: In a prospective study of 294 healthy children (6 months-3 years), characteristics of AOM complicating URI were studied Verify symptoms and signs The diagnosis of Acute Otitis Media requires an efficient pediatric ear exam with appropriate visualization of the tympanic membrane. History Take a problem-focused history to identify symptoms, parent's perception, and risk factors. Remember, an effective history aids in the overall clinical picture but no gold standard history markers for the diagnosi Otitis media is an infection of the middle ear that causes inflammation (redness and swelling) and a build-up of fluid behind the eardrum. Anyone can develop a middle ear infection but infants between six and 15 months old are most commonly affected - Heely wheel replacement large. - Joker Sad ringtone download mp3. - Untried race horses for sale. - When do Wimbledon tickets go on sale 2021. - Desired pronouns meaning. - Playgrounds Adelaide Hills. - Schaerer Coffee Art C Parts. - Pregnant at 13 Reddit. - Chimney Crack sealant. - 142 Harvest Way, Summerville, SC 29483 owner. - Europe Map colored. - 2015 gsxr 1000 hp. - What is your life's blueprint questions and answers. - Zillow Forest Hills NC. - It is a broken bone. - Horticulture textbook PDF. - Snoqualmie Pass webcam. - Free tree giveaway 2020 near me. - Reddit COVID mental health. - Zoo Tycoon 2 Ultimate Collection Free Download. - Printable map of Alaska. - Best Secrets resort. - Gel full set Nails Designs. - Guitar scale generator. - Nj photo download. - Cheer competition Las Vegas 2021. - Black and white Safari animals. - Explain what the seminal do because of the removal act. - A in NBA for short Daily Themed Crossword. - Hunts for food crossword clue. - Chicken Feather Cleaning Machine price in Nepal. - Pretty looks nose lift price list 2021. - Dog memes 2021. - Ch 1 Integers Class 7 PDF. - Fiesta Americana Cancun Villas Covid testing. - Spago Windsor Reservations. - Free Asterisk certification. - Cute panda Pictures cartoons. - Cigare Soorati. - Causes of lawlessness. - Free two column Tumblr themes.
1.786371
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Analytical Testing for 1,4-Dioxane 1,4-Dioxane (dioxane) is a chemical of concern for its potential health effects as a carcinogen and irritant. It is commonly found in personal care products such as detergents, shampoos, body lotions, and cosmetics, and is widely used as an industrial solvent and stabilizer in manufacturing processes (e.g., electronics, metal finishing, fabric cleaning, pharmaceuticals, herbicides, pesticides, antifreeze, paper, etc.). Currently, there are no established limits on the amount of dioxane in personal care products nor is it specifically regulated in manufacturing wastewater streams that may impact the surrounding environment. Manufacturers of personal care products should conduct laboratory analysis to determine the levels of dioxane in their products, and manufacturers using dioxane in their processes should analyze their waste streams for possible dioxane content. Analytical Options of Dioxane Testing Dioxane testing can be performed by various analytical methods, depending on the specific data requirements. Some methods can achieve lower detection limits more accurately and reliably than others. Columbia Analytical uses a number of procedures to detect dioxane, depending on the sample matrix and the data quality objectives of the project, including those that detect amounts below any current state advisory levels. *Due to the difficulty with some matrices a 5-fold dilution may be performed, resulting in an increased method report limit of 25 ppb. **Lower detection limits are available. Dioxane can be detected using EPA 8260; however, its high water solubility causes relatively high reporting limits. Routine organic extraction procedures like those traditionally used for EPA 8270 analyses produce low recoveries (approximately 50% or less). To increase sensitivity, Columbia Analytical uses an extraction procedure that allows an increase in the extraction efficiency of dioxane into the non-aqueous phase to 80-90%. To further increase sensitivity, the process uses gas chromatography with mass spectroscopy (GC/MS) in conjunction with isotope dilution, large volume injection, and selective ion monitoring (SIM). Complicated matrices like soap, shampoo and lotions can cause additional analytical problems, making it difficult to obtain accurate and reproducible sample concentrations, especially at lower limits of detection in the part per billion range. To address these issues, Columbia Analytical uses a heated headspace sampler with a GC/MS. A sodium chloride-treated aliquot of sample is heated to drive the dioxane into a sample vessel's headspace. This headspace sample is directly injected into the GC/MS in SIM mode to measure the dioxane concentration. The use of this method allows for a dynamic range and also decreases the time to reach equilibrium from one hour to less than 15 minutes. To enhance the accuracy and precision of the GC/MS SIM method, the labeled compound dioxane-d8 is used as the internal standard. Health Risks of Dioxane The EPA has classified 1,4-Dioxane as a "Group B2″ probable human carcinogen of low carcinogenic hazard. Dioxane is presently banned throughout the European Union and has been listed since 1988 as a chemical known to cause cancer or reproductive toxicity under the State of California's Proposition 65. The National Institute for Occupational Safety and Health (NIOSH) indicates that dioxane can cause symptoms including dizziness, vomiting, unconsciousness, abdominal pain, and eye irritation. The NIOSH international chemical safety card on dioxane also indicates that dioxane can be absorbed through the skin, which is of considerable concern, considering its ubiquity in many personal care products. There is little scientific data available on the effects of long-term exposure to dioxane on human health. However, exposure to carcinogenic compounds is believed to have the strongest effect during growth and development stages. Therefore, the greatest concern about dioxane in personal care products is the potential exposure of children. No official information exists about specific age-related dioxane effects, such as whether children differ from adults in their susceptibility. There are also few or no studies concerning chronic low-level exposure; however, since the effects of many carcinogens are cumulative, low-level exposure beginning at a young age may result in considerable cancer risk over time. Sources of Dioxane in the Environment 1,4-Dioxane is a man-made compound primarily used as an industrial solvent or solvent stabilizer for chlorinated solvents or volatile organic compounds (VOCs). It has a high potential for entering the environment, due to its volatility and solubility in water. Industrial solvents are used in a wide variety of manufacturing processes (e.g., electronics, metal finishing, fabric cleaning, pharmaceuticals, herbicides, pesticides, antifreeze, paper, etc.). As a stabilizer, 1,4-Dioxane prevents the breakdown of chlorinated solvents during the manufacturing process. Releases of chlorinated solvents, or spent solvents disposed of improperly, can be a primary source of dioxane in the environment. 1,4-Dioxane is also found in household products such as detergents, shampoos, body lotions, dishwashing soap, pharmaceuticals and cosmetics. Dioxane is a manufacturing by-product of the ethoxylation process. Ethoxylation is a chemical process in which ethylene oxide (1,2 epoxyethane) is added to fatty acids in order to make them more soluble in water. This process makes degreasing agents such as sodium lauryl sulphate less abrasive and gives products enhanced foaming properties. Unless removed under precise conditions, small amounts of dioxane are produced during ethoxylation. Dioxane, however, is unlisted in the ingredients of most products, as it is generally considered an accidental by-product of the production process. Dioxane in personal care products enters the environment via waste streams, such as wastewater treatment plants and landfills. The U.S. Food and Drug Administration (FDA) has provided guidance to manufacturers about a process called "vacuum stripping" to help minimize the amount of dioxane in their final product. Dioxane has been detected in surface and ground waters throughout the United States. An additional concern is that traditional remediation technologies used for sites contaminated with chlorinated solvents are ineffective at removing dioxane. Dioxane Information for Consumers To identify potential dioxane containing products, consumers should search product ingredient lists for indications of ethoxylation including "myreth", "oleth", "laureth", "ceteareth", and other "eth" compounds, as well as "PEG," "polyethylene," "polyethylene glycol," "polyoxyethlene," or "oxynol" in ingredient names. If consumers have further questions about the presence of dioxane in a particular product they should contact the manufacturer by calling the phone number on the product for more details; for instance, whether the manufacturer is using "vacuum stripping" to decrease dioxane levels, and what are the dioxane levels in the product. Unfortunately, it can be difficult to ascertain which products were made using processes that involve chlorinated solvents and may have produced dioxane. Due to the potential health risks entailed in the use of personal care products that contain dioxane as a by-product of manufacturing, and especially since children's exposure to dioxane should be minimized until the long-term effects of exposure during development have been ascertained, manufacturers should provide consumers with information on dioxane content. For more information on 1,4-Dioxane testing, contact Columbia Analytical at _PHONE_ or via their website: _URL_. 1. The Campaign for Safe Cosmetics, _URL_ Retrieved 10/28/2009. 2. State of California OEHHA Safe Drinking Water and Toxic Enforcement Act of 1986, updated September 11, 2009 (Proposition 65). Chemicals known to the State to cause cancer or reproductive Toxicity. Retrieved 12/15/2009. 3. FDA 1,4-Dioxane (1,4-Diethyleneoxide), _URL_ Retrieved 01/15/2010. 4. EPA Integrated Risk Information System, 1,4-Dioxane (CASRN 123-91-1), _URL_ Retrieved 10/28/2009. 5. Agency for Toxic Substances and Disease Registry (ASTDR); Toxicological Profile for 1,4 Dioxane (Draft for Public Comment) Atlanta, GA: US Department of Public Health and Human Services, Public Health Service. Retrieved 10/28/2009. 6. "International Chemical Safety Card". National Institute for Occupational Safety and Health. _URL_ Retrieved 01/23/2010. 7. "OPPT Chemical Fact Sheets 1,4-Dioxane (CAS No. 123-91-1)". United States Environmental Protection Agency. _URL_ Retrieved 01/23/2010. Tags: 1-4-Dioxane, analysis, analytical, carcinogen, chemical, concern, consumers, detect, detergents, dilution, Dioxane, dioxane testing, environment, EPA 8260B, GC/MS, GC/MS SIM, headspace, health risks, information,
1.580087
openbmb/Ultra-FineWeb
San Pablo City During the pre-Spanish times, Sampaloc, composed of four big barrios, was bounded by Mt. Banahaw and Mt. Makiling. It was in 1521 that Sampaloc was renamed San Pablo de los Montes. San Pablo became a parish in 1596 and then a municipality in 1647. It wasn't until 1941 that San Pablo became a city. The passage of a charter bill in 1940, known as the City Charter of San Pablo or Commonwealth Act No. 520, made San Pablo into a city. Inaugurated on March 30, 1941, San Pablo City's first appointed City Mayor was Dr. Potenciano Malvar. Please mail in any comments or errors encountered. Copyright © 1998 Laguna Internet
1.237215
HuggingFaceFW/fineweb-edu
What is the Functional Evaluation? The Functional Evaluation (FE) is probably different from what you typically think of with a nutritionist. The science behind it? The FE is a process allowing me to identify which organ systems may be under stress. Every organ system is surrounded by a neurovascular or neurolymphathic network (neuro, meaning brain - vascular meaning blood vessels, and lymphatic meaning lymph vessels). When an organ becomes stressed, blood and lymph are pushed to that area of the body to aide in drawing necessary nutrients to support the organ. The fluid collects, essentially inflaming the area (major or minor), allowing an individual to feel changes in tenderness in specific points on the body. So who designed these points? Most of the points I use are derived from various physicians: Chapman-Neurolymphatic Reflexes Frank Chapman D.O, discovered various points throughout the body, typically in soft tissue (think in between the ribs - intercostal spaces), Your body has autonomic nerve ganglion endings that branches off the spinal column to the organ, essentially giving a reflex point to the area palpated (pressed for tenderness). Bennett-Neurovascular Reflexes Terence Bennett D.C. created specific points that may be over a specific organ or are reflexes from the organ. The reflex point is normally felt as a tight muscle and is usually responsive to palpations. Riddler-Nutritional Reflexes Robert Riddler D.C developed a technique that utilizes reflex points on the body identifying specific nutrient deficiencies. Dr. Riddler tested various trigger points, gave the patient a specific nutrient, then retested, noting a change in the patient's rating scale. So what does that actually mean? What will I experience? Each client has a completely individual experience. Typically, I'll use a blood pressure cuff on the arm and/or the leg for some assessments, so it's important that you dress appropriately. Many points are tested while a client is lying down or sitting on the exam table. We'll go through the evaluation once to determine your individual baseline feedback, then again through your most tender points to determine which nutrients can best support your body. Appointments typically take an hour, and I'll walk you through each point to ensure you are comfortable during the exam. We'll also go over any contraindications such as pregnancy, back pain, deep vein thrombosis, etc, before proceeding. The really amazing part is that you know EXACTLY what you need to support your body before you leave my office. *Please note Functional Evaluation Appointments are only scheduled for established clients.
1.638125
Zyphra/Zyda-2
A new report from the United Nations Intergovernmental Panel on Climate Change (IPCC) is a red-alarm wake-up call, for all of us. "Several hundred million" lives are at stake, threatened by super hurricanes and typhoons, heat waves, drought and flooding, reduction of food crops, poverty, and starvation. The conclusion is clear: Regardless of what industry you work in, we all must do more to limit and hopefully reverse the undeniable damage being done to our planet. The IPCC's strong recommendation is to have a low energy demand to reduce global warming to 1.5°C. Even a temperature rise of "1.5°C is much worse than the 1°C we're experiencing now". But we have only 12 years to achieve this goal and prevent devastating consequences. I'm proud to run Allied Control Limited, a Bitfury subsidiary and a Hong Kong-based company that uses 2-phase immersion cooling technology to dramatically reduce the large amounts of energy being used to power datacenters around the world. Immersion cooling technology is the next-generation sustainable solution for our digital world. High-powered datacenters are increasingly used for everything from internet searches to artificial intelligence to securing the Bitcoin Blockchain, and it is crucial we make sure they are energy efficient, sustainable and productive. The Bitfury Group and Allied Control are working together to lead the way with our signature custom designed immersion cooling solution. Data centers contain millions of computer chips. To effectively secure the Bitcoin Blockchain and supporting a future of much more energy-efficient financial transactions, these chips are used to solve complex cryptographic mathematical problems. As these chips run, they generate a significant amount of heat. In traditional data centers, resources are spent on air-conditioning systems that keep the chips cool, which can be expensive and use a lot of electricity, in many areas often generated by burning fossil fuels. Immersion cooling provides an environmentally responsible solution to today's challenges. Immersion-cooled data centers use far less electricity on air conditioning and cooling because computer chips are placed directly into a pool of 3M's leading Novec fluids. These fluids are safe for computer chips and keep the chips cool as they run and generate heat. The fluid is evaporating and changing from liquid to vapor phase as the chips generate heat. When the Novec fluid evaporates, it rises to the top of the container, where it comes into contact with pipes containing cooled water. Upon contact with the cooled pipes, the Novec vapor condenses and returns to the pool where it continues cooling the chips. This cutting-edge process is up to 4,000 times more efficient than traditional air cooling, and it is silent, non-toxic and environmentally friendly. This proprietary immersion cooling solution is an incredible innovation that significantly reduces energy consumption and deployment time and delivers environmental sustainability. We've seen these effects in the datacenters we've built, which are the world's largest and most efficient immersion cooling datacenters. Our technology is award winning and the company has built many of the world's largest immersion cooled datacenters. The company has won several awards for this work, including: - Best Green ICT Award – Hong Kong's Most Energy Efficient Data Center - DatacenterDynamics Award – Future Thinking & Design Concepts - Green Innovations Award – Gold – Application of Immersion Cooling in Data Centers - Most Valuable Services Award (Hong Kong) Next month, I'll be in Dallas at SC18, the International Conference for High Performance Computing, Networking, Storage, and Analysis. There I hope to meet with others to discuss ways we can work together to address many of the challenges we face, including climate change. I invite you to our booth #1616 to see our multiple live demonstration systems donating processing time for cancer research.
1.219087
m-a-p/FineFineWeb
Using this service, Chinespod, I wonder at times, how people of the different language groups of the 華人 consider the theoretical nature of Chineseness. History, language, food, writing system, customs? All seem to vary a great deal within Greater China and its communities worldwide. Some aspects of history can be a point to think a certain degree of familiarness to what it is to be Chinese. This question could be thrown the other way, what is to be European/Western, Latino, African, etc. Until about 500-600 years ago, the Japanese were proud of their Chineseness, but division of "race" ( forgive the archaic word which is meaningless in scientific terms, but still socially used) had further been reinforced with European colonial powers. This could call for another lesson, but I would like to hear some insights on the concept of Chineseness. New lesson idea? Please contact us.
1.810513
openbmb/Ultra-FineWeb
Economic Effects of RGGI How Selling Allowances Affects Consumer Prices In other pollution reduction programs, power companies are given the allowances for free, the companies then pass through the "market value" of these allowances in their bills to consumers. This means that the cost of electricity to consumers will include as much of the cost of allowances as the law permits generators to add on, whether those allowances are purchased or obtained free of charge. Selling the allowances ensures that their proceeds will benefit the public by funding projects to conserve energy, reduce CO2 emissions and develop clean technologies. The decision to sell allowances takes into account the European Union's experience. The E.U. gave away 90 percent of its allowances, thinking that would ease industry's compliance cost. However, that mechanism resulted in companies enjoying a windfall; power costs to customers increased to cover the cost of the allowances, but generators did not pay for the allowances. In the U.K. alone, free allowances amounted to a $1 billion grant to the power industry. Likely Price Impact of RGGI The cost of allowances, like the cost of fuel, will be built into generators' electricity prices. However, modeling analysis revealed that price impacts would be negligible. Economic modeling projected that RGGI would increase wholesale electricity prices by about 1.6 percent (78 cents per month for a typical residential customer) in 2015 and 2.4 percent ($1.13 per month for a typical residential customer) in 2021. Economic models also projected that the price per allowance would be $2/ton in 2009. Though the projections were considered accurate, the regulations include some mechanisms to mitigate the risk of high prices. These mechanisms include expanding the use of offsets, adjusting compliance periods and holding frequent auctions. There is also a "circuit breaker" provision that expands offsets if the price of an allowance rises to $7/ton. Analysis Group Report: The Economic Impacts of the Regional Greenhouse Gas Initiative on Ten Northeast and Mid-Atlantic States According to the Analysis Group Report released in November, 2011, RGGI has raised over $1.6 billion for the ten participating states since the program began in 2008. Most of the funding from the auction proceeds was spent on energy efficiency programs, saving regional customers $1.1 billion in electricity bills, and over $174 million on natural gas and heating bills. RGGI programs also created 16,000 jobs throughout the region, and the region's payments for out-of-state fossil fuels decreased by over $765 million. (See link at right.)
1.375975
HuggingFaceFW/fineweb-edu
If you have ever experienced one, you know a lot of time and money is spent correcting the damage caused by the backup. Sewer backups caused by blockage due to debris or line breakage are cleaned and/or repaired as soon as possible. Tree roots and improper disposal of items such as grease, diapers, and rags typically cause sanitary sewer line blockages. City ordinance prohibits property owners from disposing of clear water into the sanitary sewer system, which can also cause backups. This includes water from any roof, surface or ground sump pump, foundation drain, or a swimming pool. If a blockage occurs in the city's main sewer line, the Municipal Services Department will take action to clear the blockage. The sewer line from a home, business, or other property to the city sewer main is the property owner's responsibility. If you experience a backup - Contact the city about emergency service requests during business hours at _PHONE_ and after hours and weekends at _PHONE_. The city will work with you to identify the location of the blockage. - If it is in an individual line to the property, the property owner will need to schedule and pay the cost of clearing any blockage. Many local plumbers provide this service. - Notify your insurance agent of the sewer backup to find out if such a claim is covered. - Clean the entire contaminated area safely and thoroughly or hire a reputable company experienced in cleaning up after sewer backups. - Document the actions you take (calls, contacts, costs) in response to the sewer backup. Many homeowners' insurance policies exclude damage resulting from sewer backups. If you are concerned about the possibility of a sewer backup, the city urges you to check with your home insurer regarding the availability of sewer backup insurance.
1.148578
m-a-p/FineFineWeb
The concept of a welfare pedestal has been popularized by Noel Pearson. As a lawyer and passionate advocate for the interests of aboriginal people who live on the Cape York Peninsula of North Queensland, some readers might expect that he would spend his time arguing for more government hand-outs to remedy social problems in aboriginal communities. However, Pearson recognizes that the welfare programs are actually a major cause of the social problems in those communities and his main focus is on finding ways to stop hand-outs from harming his clients. He is not against government help for his clients, he just wants to ensure that it does them more good than harm. The insight behind the welfare pedestal is that welfare payments can provide perverse incentives by encouraging some people to remain on welfare rather than to seek paid employment. Over the last decade or so, concern about an emerging problem of inter-generational welfare dependency (in non-indigenous communities as well as indigenous communities) has led to some tightening up in the provisions attached to unemployment benefits. It is too soon to claim that the problems associated with unemployment benefits and pretend work schemes have all been resolved, but the problems are now widely recognized and some appropriate remedial action is being taken. The example of a government program contributing to the welfare pedestal that Pearson gives in his recent lecture, 'Pathways to Prosperity for Indigenous People', is family benefits. He suggests: 'Life on the welfare pedestal in a country that distributes money through a generous family tax benefit system is quite a rational choice' (The Sir Ronald Trotter Lecture, New Zealand Business Roundtable, 2010). I had not previously thought of the family tax benefit in that way. I have tended to view the family tax benefit as a kind of negative income tax, providing net benefits for families with low and modest incomes. I was previously aware of adverse incentives resulting from fairly high effective marginal tax rates for people on fairly modest family incomes above the point where the means test begins to cut in (about $45,000). According to the way economists usually look at these things, however, a family with four children obtaining $19,600 per annum from family benefits has no disincentive to obtaining additional income from work of more than $25,000. In another paper Pearson acknowledges that the absence of punitive marginal tax rates is probably not an important consideration when people in Cape York Peninsula make their decisions about how many hours of the week they allocate to work or leisure. He writes: Pearson argues that 'conditions and incentives to make active and beneficial life choices should apply to family payments' even though he acknowledges that problems arise because such payments 'are not indigenous-specific schemes'. That poses a question: If people make the choice to live on generally available family benefits rather than to earn higher incomes, why should we view this as a problem? I see no problem in individuals choosing to live on low incomes. We should respect the choices that some individuals make to live a life of poverty (and of chastity too, if that is their choice). I can't see why anyone should have a problem with individuals making whatever income/leisure choice that they desire. I can see a problem, however, in governments providing family benefits to people who do not have adequate regard for the well-being of their children. I think we (taxpayers/voters) should insist that family assistance should only be provided to parents when they meet conditions such as ensuring that their children attend school regularly. Perhaps it would not be too difficult for a prime minister who has a special interest in educational opportunity to find a simple way for such a condition to be applied to family tax benefits across all sections of the community.
1.335283
HuggingFaceFW/fineweb-edu
FINAL DIAGNOSIS: Plasma cell neoplasm, favor solitary plasmacytoma of bone. Immunosecretory disorders, or gammopathies, result from the proliferation of monoclonal B cells, which may be plasma cells or plasmacytoid lymphocytes. The secretion of a single homogenous immunoglobulin, known as an M protein or monoclonal protein, characterizes these proliferations. Monoclonal protein expansion is responsible for a range of clinical diseases, with the common finding of an M protein in serum by electrophoresis. True plasma cell entities include multiple myeloma, plasmacytoma, amyloidosis, and light chain deposition disease. In addition, monoclonal gammopathy of undetermined significance (MGUS) denotes the presence of an M protein in the serum of patients in the absence of other clinical, radiologic, or pathologic findings. The most common plasma cell neoplasm is multiple myeloma, also known as plasma cell myeloma, accounting for 15 percent of all hematologic malignancies in the United States. Multiple myeloma is a multi-focal plasma cell proliferation in bone marrow, in which neoplastic cells replace normal marrow cells, produce excess immunoglobulin, and infiltrate bone. Free light chains are also produced along with the intact proteins, which are small enough to be excreted in urine. These light chains are detected by urine protein electrophoresis and are designated Bence-Jones proteins. A spectrum of clinical, laboratory, and pathologic findings is encountered in multiple myeloma. Excess cytokines activate osteoclasts, leading to bone destruction and subsequent discrete lytic lesions or diffuse osteopenia. Increased bone resorption also leads to hypercalcemia with its attendant neurologic manifestations. Marrow replacement causes anemia, leukopenia, or thrombocytopenia. Patients are susceptible to recurrent bacterial infections due to the suppression of normal humoral immunity, which is frequently the cause of death. The excess monoclonal protein in blood may lead to hyperviscosity syndrome, or adhesion of red blood cells with rouleaux formation on a peripheral smear. Bence-Jones proteins are toxic to renal tubular cells, and thus may contribute to renal insufficiency or failure. Some light chains produced by the neoplastic cells may deposit in organs leading to secondary amyloidosis. Diagnosis of multiple myeloma requires the presence of an M protein in serum and/or urine, the presence of bone marrow clonal plasma cells, and the presence of related organ or tissue impairment, such as lytic bone lesions, hypercalcemia, or anemia. Although no specific concentration is definitive, the serum M protein is typically greater than 3 g/dl. Bone marrow biopsy usually contains greater than 10 percent plasma cells in sheets or nodules, although involvement may be focal rather than diffuse, and may not be sampled by the biopsy. Multiple myeloma has a median survival of 3 years, with 10 percent survival at 10 years. MGUS is important because approximately 25 percent of patients develop multiple myeloma, amyloidosis, or other lymphoproliferative disease within 20 years, with a median interval of 10 years. Thus, patients with MGUS must be followed indefinitely for evidence of progressive disease. Patients with MGUS are asymptomatic, and laboratory and clinical findings demonstrate serum M protein less than 3 mg/dl, fewer than 10 percent plasma cells in marrow biopsy, and the absence of lytic bone lesions, hypercalcemia, anemia, or renal insufficiency. The prevalence of MGUS is 1 percent in patients older than 50 years and 3 percent in patients older than 70 years. Plasmacytomas are tumors composed of monoclonal plasma cells, which are cytologically, immunophenotypically, and genetically identical to those seen in multiple myeloma, but occur as solitary lesions. This tumor may arise in bone or soft tissue. In bone, it is designated solitary plasmacytoma and is characterized by the absence of multiple osteolytic lesions. In soft tissue, it is known as extramedullary plasmacytoma, most commonly occurring in the head and neck or lungs. Epidemiology and Clinical Presentation: Solitary plasmacytoma of bone is relatively rare, accounting for 3 to 5 percent of all plasma cell neoplasms. The median age at diagnosis is 55 years, occurring 10 years earlier than multiple myeloma. However, this tumor has been reported in patients as young as 15 years. Males are more frequently affected than females. The tumor more commonly involves the axial skeleton than the appendicular skeleton, and distal appendicular disease is extremely rare. As in multiple myeloma, areas of marrow with the most active hematopoiesis are targeted, including the vertebrae, ribs, skull, pelvis, femur, clavicle, and scapula, in order of frequency. The thoracic vertebrae are more frequently involved than the lumbar, sacral, or cervical spine. The tumor begins in the medullary cavity and erodes through the cancellous bone and cortex. Thus, punched-out defects are seen on radiographs, usually 1 to 4 cm. Patients may present with pathologic fracture or skeletal pain. Cord compression may be the presenting feature of a solitary plasmacytoma involving the vertebrae. A soft tissue extension of the tumor may result in a palpable mass, particularly if a rib is involved. The diagnosis of solitary plasmacytoma of bone depends on ruling out multiple myeloma. Specifically, the International Myeloma Working Group has established the following requirements : An MRI can be useful to identify additional unsuspected plasma cell lesions which do not appear on skeletal surveys. The gross and microscopic features of solitary plasmacytoma are identical to those of multiple myeloma. The neoplastic tissue has a soft, gelatinous, fleshy gross appearance with hemorrhagic areas. Bone marrow biopsy demonstrates an excess of plasma cells, which occur as masses in sheets or nodules, displacing normal marrow. In contrast, normal or reactive plasma cells tend to occur in small clusters of five or six cells around arterioles. In general, plasmacytomas occupy at least 30 percent of the biopsy marrow volume. Occasionally, prominent osteoclastic resorptive activity can be seen on the biopsy corresponding to the lytic lesions seen on radiographs. Neoplastic plasma cells are of variable maturity ranging from immature, pleomorphic, or anaplastic cells, to mature forms indistinguishable from normal plasma cells. Immature forms, or plasmablasts, show a high nuclear/cytoplasmic ratio, prominent nucleoli, and loose reticular chromatin. Multinucleated and polylobulated cells can also occur. Mature cells are oval with a round eccentric nucleus and coarsely clumped "clock-face" chromatin, with abundant basophilic cytoplasm and a prominent pale perinuclear Golgi zone. Plasmablastic morphology is associated with a poorer prognosis. Because immaturity and pleomorphism rarely occur in reactive plasma cells, these features are reliable indicators of neoplastic plasmacytosis. The cytoplasm contains abundant endoplasmic reticulum with retained immunoglobulin producing morphologically distinctive findings. These include blue-white grape-like accumulations (Mott cells, Morula cells), cherry-red refractive round bodies (Russell bodies), vermillion-staining glycogen-rich IgA (flame cells), overstuffed fibrils, and crystalline rods. Although these cytoplasmic features are suggestive of neoplastic plasma cells, they can also be found in reactive cells as well. Plasmacytomas contain cytoplasmic immunoglobulin and demonstrate monotypic expression. For example, cells may express kappa light chain immunopositivity in the absence of lambda light chain expression, or gamma heavy chain immunopositivity in the absence of mu and alpha heavy chain expression. In 85 percent of multiple myelomas, both heavy and light chains are produced, while only light chains are produced in the remaining 15 percent. The most common immunoglobulin produced by neoplastic plasma cells is IgG. IgA is occasionally encountered, while IgD, IgE, and IgM are rare. Neoplastic plasma cells lack immunopositivity for surface immunoglobulin. Plasmacytomas typically lack expression of the pan-B-cell antigens CD19 and CD20, and express CD56, a neural cell adhesion molecule. This is in contrast to normal plasma cells which express the opposite profile. The majority of cases also express CD38 and the immunoglobulin-associated antigen CD79. Most cases express CD138, a collagen-binding proteoglycan, which may be important for anchoring in the marrow. Occasional cases may express CD10. Plasma cells have low proliferative activity, making cytogenetic studies inherently difficult to perform. However, numerical and structural chromosomal aberrations have been described in 20 to 60 percent of newly diagnosed multiple myeloma patients. Complex karyotypes with multiple chromosomal gains and losses are the most frequent changes, but translocations, deletions, and mutations have all been reported. Monosomy or partial deletion of 13 (13q14) is the most common finding, occurring in 15 to 40 percent cases. Deletion of 17p13, associated with allelic loss of p53, is reported in 25 percent of cases, and may predict a poor
2.140024
openbmb/Ultra-FineWeb
In this paper, we re-examine the properties of two commonly adopted government reimbursement schemes for pharmaceuticals: reference pricing and fixed percentage reimbursement. We depart from the previous literature by assuming that the individual demand is price-sensitive and depends on the copayment rate (i.e., the part paid by each consumer). We obtain two novel results under reference pricing: first, as the copayment rate increases, so do pharmaceutical prices; second, this increase in pharmaceutical prices reduces social welfare. Whilst reference pricing does emerge as a preferable reimbursement scheme, demand elasticities and the copayment rate interact in complex ways. This leads (unexpectedly) to the possibility that a higher copayment rate (lower reimbursement rate) results in higher government expenditure. - Copayment rates - Pharmaceutical reimbursement schemes
1.143495
openbmb/Ultra-FineWeb
100 mile journey starts with 1 step Business loves the idea of revolutionary radical improvement but turnaround efforts often fail during the early adoption phase. A better approach is through small incremental change improve one step of the process at a time. We are built to resist radical change, all of us. Small incremental change overcomes this, it starts with the smallest of steps that gets around our fear response. A fantastic example of the success of incremental change is the Olympics, in 2012 British Cycling's performance director Dave Brailsford went on BBC Breakfast and gave the game away. "The whole principle came from the idea that if you broke down everything you could think of that goes into riding a bike, and then improved it by 1%, you will get a significant increase when you put them all together," he explained. Everything was considered from washing your hands properly and reducing the risk of illness to having your own pillow to sleep on, there were no magic bikes or special wheels. Yet in business when we talk about improvement we still think we are going to watch the process and find one big improvement to revolutionise the process. Instead through understanding the entire process, breaking it down and improving each step by 1% when you run the process again you will have the improvements you are after. This is much more exciting because it means the team working with the current process can be the ones to make the improvements. Incremental improvement is also easier to sustain because: - Fear is reduced By involving the team, breaking down the process in to small steps and improving each step at a time it is easier for the team to accept and less likely to encourage a fear response - Involving people shows you are listening Asking the team to look at their process and then implementing the improvements they suggest shows you are listening and encourages a more supportive culture. - Developing people Giving the team time and skills to review the steps in the process and suggest small improvements will provide the team with desirable skills that can use when faced with process problems everyday What are you waiting for? Small incremental change, one step at a time.
1.241756
openbmb/Ultra-FineWeb
What Is The Difference Between @RequestBody And @RequestParam? Can RequestParam be null? You could change the @RequestParam type to an Integer and make it not required. This would allow your request to succeed, but it would then be null. You could explicitly set it to your default value in the controller method: @RequestMapping(value = "/test", method = RequestMethod.. What is the use of @ResponseBody annotation in spring? @ResponseBody is a Spring annotation which binds a method return value to the web response body. It is not interpreted as a view name. It uses HTTP Message converters to convert the return value to HTTP response body, based on the content-type in the request HTTP header. What is an advice in spring? Advice is an action taken by an aspect at a particular join point. Different types of advice include "around," "before" and "after" advice. The main purpose of aspects is to support cross-cutting concerns, such as logging, profiling, caching, and transaction management. Can a GET method have body? GET requests don't have a request body, so all parameters must appear in the URL or in a header. While the HTTP standard doesn't define a limit for how long URLs or headers can be, mostHTTP clients and servers have a practical limit somewhere between 2 kB and 8 kB. What is @RequestParam? @RequestParam is a Spring annotation used to bind a web request parameter to a method parameter. It has the following optional elements: defaultValue – used as a fallback when the request parameter is not provided or has an empty value. What is @RequestBody in spring? Simply put, the @RequestBody annotation maps the HttpRequest body to a transfer or domain object, enabling automatic deserialization of the inbound HttpRequest body onto a Java object. First, let's have a look at a Spring controller method: @PostMapping("/request") Can we use @RequestBody with get? Yes, you can send a request body with GET but it should not have any meaning. Can we have two @RequestBody? You are correct, @RequestBody annotated parameter is expected to hold the entire body of the request and bind to one object, so you essentially will have to go with your options. Now just register this with Spring MVC. What is the use of @RequestBody? @RequestBody and @ResponseBody annotations are used to bind the HTTP request/response body with a domain object in method parameter or return type. Behind the scenes, these annotation uses HTTP Message converters to convert the body of HTTP request/response to domain objects. What is @QueryParam in REST API? Basically, @QueryParam denotes that the value of the Query Parameter with the corresponding name will be parsed, and if parsed correctly it will be available on the method argument denoted with @QueryParam . There are baically two ways to pass parameters in a GET request in REST services. What is difference between @RequestParam and @PathVariable? As the name suggests, @RequestParam is used to get the request parameters from URL, also known as query parameters, while @PathVariable extracts values from URI. The required=false denotes that the query parameter can be optional, but the URL must have the same URI. What is difference between @controller and @RestController in spring? Difference between @RestController and @Controller in Spring. … The @Controller is a common annotation that is used to mark a class as Spring MVC Controller while @RestController is a special controller used in RESTFul web services and the equivalent of @Controller + @ResponseBody. What is @RequestParam in Spring MVC? In Spring MVC, the @RequestParam annotation is used to read the form data and bind it automatically to the parameter present in the provided method. So, it ignores the requirement of HttpServletRequest object to read the provided data. How do you pass parameter in Postman? Request Parameters in PostmanJust prepare a GET Request in Postman with the URL _URL_ and then click on Params.Write the following things written under Key-Value pair as shown. … Look at the preview, you would see that instead of the google home page we have received a response for a specific search query which is ToolsQA. Is RequestParam required by default? Method parameters annotated with @RequestParam are required by default. will correctly invoke the method. When the parameter isn't specified, the method parameter is bound to null. What is @RequestBody? This is used to convert the body of the HTTP request to the java class object with the aid of selected HTTP message converter. This annotation will be used in the method parameter and the body of the http request will be mapped to that method parameter. What is difference between @PathParam and PathVariable? The @PathVariable annotation is used for data passed in the URI (e.g. RESTful web services) while @RequestParam is used to extract the data found in query parameters. These annotations can be mixed together inside the same controller. @PathParam is a JAX-RS annotation that is equivalent to @PathVariable in Spring. What is @RequestMapping? @RequestMapping is one of the most common annotation used in Spring Web applications. This annotation maps HTTP requests to handler methods of MVC and REST controllers. In this post, you'll see how versatile the @RequestMapping annotation is when used to map Spring MVC controller methods.
1.837935
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Data storage requirements are increasing dramatically and therefore much attention is being given to next-generation data storage media. However, in optical data storage devices the storage density is limited by the wavelength of light. This limitation can be avoided by an alternative data addressing mechanism using electric fields between nanoelectrodes with smaller dimensions than the wavelength of commercially available lasers. It has been shown that DNA of a range of lengths can be aligned in an electric field [1, 2]. In this study we demonstrate the use of an ac electric field to address DNA as a data storage technique. λ-DNA, immobilised on an array of electrodes utilising its self-assembling properties, serves as a scaffold for fluorescent molecules. The DNA is immobilised onto gold electrodes in a multi-step procedure ensuring a controlled surface coverage of the molecules onto specific electrodes. To minimise background fluorescence and to enable reversible stretching, the substrate surface is silanised prior to DNA immobilisation. Using a strong, spatially confined ac electric field (1MV/m, 400kHz) the DNA molecules on each electrode are individually and reversibly stretched into a focused Argon laser beam. The fluorophores (YOYO1, Molecular Probes) are rapidly photobleached when the power density of the beam is increased, allowing for data storage when associating a photobleached data point with a binary 1 and an intact data point with a binary 0 (Figure 1). The resulting pattern of high/low fluorescence intensities is read by measuring the fluorescence intensity, using the same dielectrophoretic addressing mechanism, but in conjunction with a much reduced power beam. Although this concept of data storage has been demonstrated only on the micrometre scale, it is a promising candidate for miniaturisation, potentially to the molecular scale. Figure 1. A pattern of selectively stretched λ-DNA on an array of 4 gold electrodes. Photobleaching the stretched DNA in this configuration will result in a 1, 0, 1, 0 signal when reading back by sequentially stretching the DNA on each electrode into a reduced power beam. The DNA is being stretched in a 1 MV/m, 400 kHz ac field. The electrodes are 10 μm in width and 15 μm apart. M. Wasizu, and O. Kurosawa, IEEE T. Ind. Appl, 1990, 26, 1165. M. Wasizu, O. Kurosawa, I. Arai, S. Suzuki, and N. Shimamoto, IEEE T. Ind. Appl, 1995, 31, 447.
1.807366
HuggingFaceFW/fineweb-edu
December 06, 2010 Sex, Frogs, and Rock & Roll Acoustic signals are not the only way we humans communicate, we also rely on visual signals. The way we dress and how we carry ourselves play a big part in the mating game. Likewise diurnal frogs draw attention to themselves with an array of visual signals; from toe-trembling, arm waving, limp-shaking, to name a few. Think about Elvis. However, most frogs prefer to be out at night, in the cover of darkness, as do juvenile homo sapiens out on the hunt. For frogs at night visual cues may not do the trick. For nocturnal frogs, acoustic communication is therefore fundamental for mate-recognition and the reproduction process. Notwithstanding the occasional Madonna or Lady Gaga, as talented as so many of them are, and as hard as they try, human musicians who happen to be female have a harder time attracting an audience than male musicians do. Beautiful, classically trained women with angelic voices, who can crank out tunes that rival songs by John & Paul, usually cannot compete with demonic looking males who may only know two or three guitar cords, cannot sing in tune if their life depended on it, whose songs are rather uninspiring, and louder than they ought to be; such is the reality of the music industry. This may not be just a socially instituted bias against female musicians, it might be a biological convention dating back eons. The best way for males (frog or human) to get the attention of females is by standing out in a crowd. For frogs the more effort a male puts into calling, and the louder he calls, the more effective the calls will be. Consequently the volume of noise put out by these little guys is amazing. A successful rock star has a following of groupies; some of them may be lucky enough to get backstage passes. Other fans just come to the concert without getting close to the star at all. An entire hierarchy surrounds the concert scene. Back at the frog pond, status is equally important. During the breeding season, many different frogs from many different species may be calling at the same time, and when large groups assemble competition is tough. Each species has its own unique mating call, but when many species chorus at the same time, it sounds as if several orchestras are playing different symphonies at once. Females single out the calls of their own species from the cacophony and then choose a suitor. For frogs at the pond, male calls may be interfered with by competing members of the same species or by the calls of different species; the larger the chorus the greater the acoustic interference. This poses a problem for females. They can't possibly check out all the males in a large chorus, and females that move around investigating different suitors are more likely to run into predators. Most females therefore prefer to choose a mate from a relatively small sample group. A female frog usually tracks the call that is the most noticeable—whether it is the loudest, the longest, or the most complex—so males need to make their calls as district as possible. Often, the call of a male is fairly distinct until a rival comes along and ruins everything. When interrupted by the call of a competitor, a male may change his own call by changing or adding notes, or by increasing the intervals between notes. A tree frog becomes attentive when a competitor arrives on the scene, and may ignore all interruptions except those of the nearest male. Since it is not feasible for one frog to outdo the entire chorus, a male simply distinguishes himself from his nearest or loudest competitor. Occasionally a male strikes out on his own, stagging a solo performance, but this can be a chancy business. Unless he is prudent, this could take too much energy and allow predators to zero in. Therefore, compared to males in a chorus, an isolated male is often more conservative with his energy. The calls of an isolated male are shorter, which makes him less attractive to females. Males that call more loudly and more frequently than their competitors should be able to attract more females, but life is not always so simple. Dense vegetation may prevent the sound of a frog's calls from traveling very far, so the quality of his perching site is significant. Breeding success for the North American gray tree frog (Hyla versicolor) seems to depend more on good perching sties more than any other variable. Ideal perches are horizontal and relatively free of vegetation, so that sound can travel far and undisturbed. When the call is made on a horizontal perch it spreads uniformly and is less likely to be reflected—a primitive but effective sound stage. Male frogs claim their territory by sound—the farther the call can travel, the larger the territory. A male with a good perch will have fewer male rivals, and when a female approaches she will be less likely to lose auditory contact. A male must compete for good calling locations either by vocalization or by fighting. Tree frogs presumably defend their territories with aggressive calls, but in some species these calls are not appealing to females. Thus if a male bickers too long or too often with other males he may forfeit his chance to mate for the night. Sound familiar? Male golden palm tree frogs (Hyla ebraccata) of Central America manage not to alienate females by finishing their aggressive calls early in the evening, establishing their territories before the females arrive. The later evening is reserved for courting calls. Eleutherodactylus coqui have solved this problem in a different way. They devised a combination call, which has the duel function of attracting females and deterring males. Since the call has notes for both purposes, the females don't seem repelled. A common strategy of subordinate males is to lie low near the perch of a dominant rock star, rather than relocating. When the dominate male is busy mating, his perching spot is temporarily unguarded, and a subordinate male may snatch the post. If the subordinate is lucky he may attract a female before the dominate male is finished mating. Another tactic is to intercept a female on her way to the dominate male. This may or may not work, females have been known to reject such overtures. My favorite rock stars among the anurans are the North American bull frogs (Rana catesbeiana). Bullfrogs are loners, but during the spring, these anurans can congregate in large numbers. Males arrive first before the females. The mating season is quite long because not all females are receptive at the same time. Some will be ready to mate in May others not until July. In addition, females may be gravid for only a day; thus in the pond males outnumber females. The absolute best location for a male is at the center of the chorus; usually the largest and oldest males are found there. Young males are pushed out to the edges of the chorus or chased away altogether, but if they assume a subordinate posture, they are allowed to remain in the area. A chorus usually stays at the same location for several nights but eventually dissolves, only to reform again at another location. Choruses form when dominate males call and are joined by other males. During the first few nights activity intensifies and peaks. After several successful males have departed and the chorus has lost it lead vocalists, it tends to dissipate. Males don't know where or when a female will be receptive so by frequently changing location they are more likely to encounter one. When a dominate male leaves for a different location other bull frogs waste no time and quickly follow him. Females remain inconspicuous as they move from one male to another and from one chorus to another. They submerge under the water until only their eyes show. Hardly causing a ripple, they make their rounds swimming through the crowd. Females enter into the males territory, briefly emerge to check out the crowd, and then submerge again to continue the search. Females may actively move around the pond for several days and the males pay little attention to them. When a female has her mind made up she touches the male of her choice. As soon as she gives this clue, the male follows her. The pair leaves the chorus to mate, and once this task is complete the female departs. As a young man I often spent as much time observing the behavior of the people who attended concerts and parties as I did listening to the music, and when I got older and obsessed with nature, in particular the nature one finds around wetlands, I couldn't help but notice the similarities. So the next time you venture past a crowd of teenagers at a concert or party, observe their posturing and consider how old the game is. The biological imperative is as ancient as life itself, and some aspects of its expression haven't changed much. Posted by Wayne Ferrier at 12:08 AM | Permalink
1.135643
HuggingFaceFW/fineweb-edu
What number of server Operating Systems will you be able to choose from? Every desktop or notebook or web server is run by an Operating System - the low-level program which interacts with the hardware equipment, including peripherals such as a mouse or a printer, and any applications that are installed on the system. Any program input through a command line or a Graphical User Interface (GUI) is processed by sending an Application Program Interface (API) request to the Operating System. On a server, each and every app runs within the parameters established by the OS as well - priority, physical memory, processing time, etc. This goes for both standard Internet site scripts and server-side software such as a media server. If a virtual server is set up on a physical one, there can be two separate Operating Systems, referred to as guest OS and host OS, which means that you will be able to set up a different software environment on the same machine. Multiple OS in Dedicated Servers The dedicated servers that we offer can be set up with as many as three different Operating Systems as we want to give you more flexible packages which will permit you to install and run any kind of web software irrespective of its system requirements. The options are CentOS, Debian and Ubuntu and these 3 OSs are among the most dependable and safe ones, not mentioning that they do not have any license fees. All three have numerous developers who have created a large number of software packages that you can install and use on your server. We also offer three web hosting Control Panels and which one you can use is determined by the Operating System that you choose when you sign up. If you need a different OS later, it won't be a problem because we can always reinstall your machine. With our Managed Services package we could also keep your OS secure by updating it every week with any patches which are available for it.
1.125651
m-a-p/FineFineWeb
The following abstract related to women and domestic violence and is from the article 'Risks and Benefits of a Gun in the Home' written by David Hemenway, published in the AMERICAN JOURNAL OF LIFESTYLE MEDICINE on 2 February 2011. Whereas most men are murdered away from home, most children, older adults, and women are murdered at home. A gun in the home is a particularly strong risk factor for female homicide victimization. Women in the United States are at far greater risk of homicide victimization than women in other developed countries, and the greatest danger for women in homicides that occur in the home comes from their intimate partners— especially partners with guns. A subgroup analysis of female homicide victimization from a large case-control study of homicide in the home in 3 metropolitan counties found that having a gun in the home was a large and significant risk factor for homicide. Most of the women were murdered by a spouse, a lover, or a close relative, and the increased risk for homicide from having a gun in the home was attributable to these homicides. Another case-control study of women murdered by intimate partners, compared with a control group of battered women, found that a gun in the home was an important risk factor for femicide. There was easy access to a firearm (eg, a gun in the house) for 65% of case perpetrators versus 24% of perpetrators of nonfatal abuse. Access to a firearm by the battered woman had no protective effect. Overall, domestic disputes are likely to be affected by the presence of a firearm. Although many spousal homicides occur following a long history of violence in the home, spousal abusers are often impulsive and volatile. The availability of a firearm increases the likelihood that an attack will prove fatal. A review of intimate partner homicides in Chicago over a 29-year period concluded that "an effective prevention strategy for intimate homicide of women... would be to reduce the availability of firearms in the home." Guns can be used not only to wound and kill but also to intimidate and coerce. Data on intimidation with firearms are relatively scarce. The National Crime Victimization Surveys (NCVS) provide information about crime but miss much intimate partner violence and thus much of the intimidation with guns in the home. Fortunately, some information about such intimidation has been picked up by other surveys. A study of battered women in emergency shelters in California (a state in which more than 600,000 women each year experience intimate partner violence) found that if there were a gun in the home, nearly two thirds of the male partners involved had used the gun to scare, threaten, or harm the women. In contrast, women rarely used the gun in self-defense; fewer than 7% of these women had used a gun in self-defense and only against batterers who had used a gun against them. Batterers use guns in a variety of ways to control their victims. Not only do they threaten to kill the women, but they also sometimes threaten to kill themselves or the children. Other methods of gun intimidation include, during an argument, cleaning, holding, or loading a gun; going outside and shooting the gun; or threatening to shoot a pet. A national random survey found more hostile gun displays against women in the home—primarily by intimate partners—than self-defense gun uses in the home by women or anyone else. The complete article with references is online at:
1.355808
HuggingFaceFW/fineweb-edu
most engaging option right there, and it's even weird because bots shouldn't be engaging at all.:) isn't spotybot created by spotify or it's a coincidence? no yandex please.. russians are going to steal your data.. thanks for so many options, some were new to me What are the most popular telegram bots? The Telegram bots list is long as many developers have experimented with the provided API to generate unique bots for various purposes. The most popular telegram bots are Gamee, Spotybot, Gif Bot, MoviesTracker bot, GitHub bot, Otouto, LittleGuardian bot, VoteBot, and MetricsBot. What's a Telegram Bot? Telegram bots are applications set to perform specific functions and interact with users. Bots run inside the Telegram environment and don't need an additional installation procedure. People can enhance the functionality of Telegram by using bots. How do you choose which online course sites to review? How is this e-learning review platform different from others?
1.030905
Zyphra/Zyda-2
Angelo R. Bouselli WASHINGTON, DC – January 21, 2005 -- While large-scale genomic sequencing technologies over the past decade have given scientists databases filled with the complete genomes of hundreds of organisms, not enough is being done to interpret all that data by assigning functions to sequenced genes (annotation), according to a report released today by the American Academy of Microbiology. An Experimental Approach to Genome Annotation proposes a new initiative to help address this challenge. "Roughly 40% of predicted genes have not been assigned even tentative functions. It is rare in science to be able to clearly delineate the boundaries of current knowledge, but that is exactly where genomics stands today," according to the report. "The annotation initiative proposed in this document will extend those boundaries and will likely lead to new applications and new progress in healthcare, biodefense, energy, the environment and agriculture."Given the current lack of a reliable source of functional annotation data, the report recommends that a centralized genome annotation initiative be established in the United States. A key component of this initiative is the development of a centrally organized database of peer-reviewed, experimentally verified gene annotations, tied to catalogs of genes that have yet to be annotated and known biochemical functions for which a gene has yet to be found. Additionally, the report cites lack of available funding as a primary reason that progress in this field has been so slow. The report recommends that the new annotation initiative provide flexible funding to support experiments that will test annotation predictions, including nontraditional funding mechanisms such as smaller awards to a greater number of laboratories and awards to support student research.The report is based on the findings of a colloquium convened by the Academy in Washington, DC in July 2004. A group of distinguished scientists, including microbiologists, biochemists and bioinformatics specialists gathered to address the critical challenges of genome annotation and to seek ways to accelerate progress in the field of genome annotation. "The genome sequences that exist today are a great available resource, and the potential impact they represent to us, if annotated accurately, though combined experimentation and bioinformatics, has yet to be explored," says colloquium chair Richard Roberts of New England Biolabs in Beverly, Massachusetts. A full copy of the report and recommendations can be found on the Academy website at _URL_ To receive a printed copy of An Experimental Approach to Genome Application email the Academy at _EMAIL_. # # # The American Academy of Microbiology is the honorific leadership group of the American Society for Microbiology. The mission of the AAM is the recognize scientific excellence, as well as foster knowledge and understanding in the microbiological sciences.
1.813442
HuggingFaceFW/fineweb-edu
If you want to observe and study the Sun safely, you better arm yourself with the SkyWatcher Solar Filter for 70mm Telescope . It works by lowering the intensity of the Sun light and by deflecting the harmful Sun rays away, allowing the user to conduct safe solar observations. The Baader Astro Solar Safety Film used in this filter performs optically similar to high quality plane-parallel glass filters. It produces a natural white image of the photosphere through the metal coatings on both sides of the film ensuring good colour balance. The SkyWatcher Solar Filter for 70mm Telescope , allows you to see the details of sunspots, bright faculae near the limb and the mottled areas known as granules. These filters enable the safe and long duration viewing of our Sun. When using the Solar Filter , place it securely over the front of your telescope to filter and ensure that the filter will not slip off. The film transmits 0.001% of visible light while blocking the rest. The film significantly decreases harmful ultraviolet rays and infrared light. When you receive your solar filter, check to confirm that your film is not damaged or torn. For more solar viewing tips, click here Compatible with SkyWatcher and Saxon 70/500, 70/700, 70/900, and 80/400 refractors.
1.464761
m-a-p/FineFineWeb
By Joseph H. Reisert Astron Antenna's Yagi antennas incorporate our unique "Antenna This feed system has the following innovative attributes: - EverSealed, fully epoxy encapsulated to prohibit Many commercial Yagis have exposed feed systems. The widely used Gamma match feed system is particularly prone to moisture incursion via the tubing used in the series matching capacitor. Furthermore, in some cases an unsealed coax connector is mounted right at or near the antenna feed point. This often facilitates the entry of moisture into the connector (and eventually into the transmission line!) The expoxy used in the AntennaFeed system seals the feed point from moisture incursion and, via a coax cable pigtail, places a sealed connector interface outside of the RF field. - Balanced center-fed system for a clean symmetrical radiation pattern; - A true 50 Ohm impedance match over a wide frequency bandwidth; - An integral ferrite bead current balun to minimize re-radiation from the outside shield of the transmission line; - Isolated from ground. The Gamma match is an unbalanced feed system since power is only connected to one side of the driven dipole. This often causes radiation pattern distortion. Our Yagis feature balanced center-feed systems. This system is more complex than a Gamma match but, it is inherently more symmetrical because power is fed to both sides of the driven dipole. Furthermore, the AntennaFeed system is less affected by the placement of the transmission line. The result is a clean and distortion free symmetrical radiation pattern. Most forms of unbalanced impedance matching systems have losses due to the tuning components employed. Furthermore, matching components inherently decrease the bandwidth of the antenna. The end result is narrower VSWR bandwidth and lower than expected gain. The balanced AntennaFeed system has no bandwidth limiting components! As a result, it has a low VSWR over a wide bandwidth and never requires tuning! No matter what you do to your installation, some of the radiated power from the antenna will be coupled back to the outside of your transmission line. This may result in pattern distortion, VSWR variations and lower than expected gain. The way to minimize this problem is to use a balun, an impedance matching transformer designed to couple an unbalanced transmission line (such as a coax cable) to a balanced feed system (or vice versa), at a feed point. The half-wave 4:1 type of impedance matching balun is sometimes used. It works well but has losses due to its associated half-wave line and is difficult to seal from moisture incursion. The AntennaFeed system is epoxy sealed and uses a simple 1:1 ferrite bead current balun. The ferrite beads act like a high resistance to any RF currents that may try to flow on the outside of the coax shield. This type of balun is simple and broadband yet very effective. It also has a low wind profile. When using a Gamma match, the center conductor of the transmission line is usually coupled to the driven dipole through a small in-line capacitor. Therefore, only the shield is grounded! Both sides of the AntennaFeed system are completely isolated from ground. Some skeptics will say that an isolated ground is more prone to lightning strikes since the feed is not grounded. This is simply not true since the boom and the other antenna elements are always grounded on a Yagi. Also, lightning strikes in a random fashion and always searches out the shortest and lowest resistance path to ground. Regardless of the antenna feed system, a good ground and impulse arrestor are highly recommended on every installation. To minimize the potential from impulse damage to a radio, first ground the shield of the feedline to the tower/mast at the interference between the antenna and the transmission line as well as the point where the transmission line leaves the tower/mast. Also ground the base of every tower/mast through a large diameter (#4 AWG or larger) copper wire connected with the shortest possible run to at least one (and preferably three) eight foot ground rod(s) spread out at the base of the tower/mast. Finally, install an impulse protector on the outside of the point where a transmission line enters a building. Do not forget to add another short ground wire (see above) from the impulse protector to an eight foot grounding rod mounted on the outside of the The balanced Eversealed AntennaFeed system is superior to unbalanced feed systems such as the Gamma match. It is sealed from moisture incursion and has a low VSWR over a wide bandwidth that never requires tuning. The built-in current balun insures that re-radiation from the antenna feedline is minimized and the radiation pattern is symmetrical. Properly installed, an AntennaFeed system is no more prone to impulses than other feed system. Astron Wireless Technologies, Inc. and the author retain the rights to all intellectual property contained herein. This information should be used as a guideline only to help you in the appropriate selection of an antenna. Back to Top
1.5384
m-a-p/FineFineWeb
one means for facilitating wireless communication, but the present invention is certainly not limited to the use of same. Like some of the other components of plug 30, the integration of RFIC in electronics 44 is dependent upon thecertain of the properties of the plug. For example, these properties include the overall size of plug 30 (e.g., 2.0 mm×1.0 mm×0.5 mm), its power requirements (active vs. passive power), the carrier frequency to be utilized (e.g., 402-405MHz (MICS band)), and the normal communications distance (e.g., 1.0-2.0 m) coupled with the associated antenna (discussed below). Generally, RFIC technology lends itself to relatively small devices. In fact, there is some thought by those of ordinaryskill in the art that RFIC's will continue to become smaller and smaller. RFIC's may also be adapted for power by both active and passive power sources, where active devices typically require a battery for power and passive devices induce power from areceived RF signal or light. While either type of power setup may be employed by plug 30, the latter is especially important given the size constraints of the plug itself. However, it is to be understood that a plug utilizing an RFIC powered by abattery may transmit signals over a further distance. A carrier frequency is the frequency at which the RFIC typically communicates with an outside device, such as the reader discussed further below. While there are commonly used frequencies within the Industrial, Scientific and Medical (ISM) bandof the electromagnetic spectrum, the FCC has allocated a specific band of frequencies for implanted medical devices. The Medical Implant Communications Service (MICS) band is typically from 402 to 405 MHz, and this band preferably supports high-speeddata communications from devices implanted within the human body over distances on the order of several meters. Plug 30 clearly falls within this category of devices. Thus, many different RFIC's may be suitable for use in plug 30 for wirelesslytransmitting output from cartridge 40 and electrode 42 to an outside receiver. One particularly suitable RFIC is sold under the product designation AMIS-52100 by AMI Semiconductor of Pocatello, Id. Other wireless technologies may be utilized by plug 30 to transmit the information garnered by the operation of cartridge 40 and electrode 42. Of course, such technology must meet the same criteria that the above-discussed RFIC technology must. One example of such other technology is known as a wireless mote. These devices typically include complex circuitry, sophisticated networking capabilities and integration of various sensors. Often, wireless motes require a battery to power the complexcircuitry, to facilitate wireless communication between nodes in a network and to power the sensors. Those of ordinary skill in the art would recognize that wireless motes can be utilized in place of an RFIC, and the particular wireless mote to beutilized could be selected based upon the constraints of plug 30. Although RFIC's or other wireless communications devices may have built in antennas or the like, it is contemplated to provide plug 30 with an external antenna in order to improve transmission distance and/or clarity. In fact, proper antennadesign, whether integrated with the wireless communicator or not, is important to the performance of plug 30. An antenna for use in accordance with the present invention is illustratively shown in the block diagram of FIG. 7 and labeled with referencenumeral 46. Suitable external antennas for use with plug 30 may be a straight piece of wire cut at its center (a half-wave dipole), a wound piece of wire (a helix or coil antenna) or the like. Such external antennas may be attached to the end of plug30 which is first inserted into a portion of eye 1 or attached at other portions of the plug. The former configuration for an antenna may be snaked down deep into one of the canaliculus without interfering with tear drainage or flow. An alternativeembodiment may include an antenna that is initially rolled up or otherwise compressed into a small area during insertion. Once inserted, the antenna may be designed to unfurl or elongate down into the lacrimal duct in order to achieve a longer length ofthe antenna, for example, but not limited to the dissolution of a binder that holds the antenna to the punctal plug, or through the use of memory wire that changes shape depending on temperature. Likewise, plug 30 may be powered by a number of different energy sources. For example, and active source, such as a battery, may be utilized. Alternatively, power cells which convert either light or body heat into energy could be suitableactive power sources. Of course, the use of an active power source such as these examples must fit within plug 30, and therefore must rather small. In this regard, a passive power source could be employed, with power being delivered to plug 30 throughan RFIC or the like. Such passive sources need not be included in plug 30, but typically, transmission distance with same is largely minimized as compared to plugs employing batteries. The use of a passive power source could require a patient to placean external device at or near plug 30, or within a suitable range. The latter could allow for operation of plug 30 without the requirement on the part of the patient to make a positive act. As light and heat converting power sources become moreefficient, it is anticipated that a passive power source will be incorporated into the device. Ultimately, plug 30 preferably transmits information garnered from tear fluid passing therethrough to a receiver system. As is shown in FIG. 7, receiver system (designated by reference numeral 50) preferably includes an antenna 52, a receiver54, a memory 56, a software package 58 and a display 60. Of course, other embodiments of receiver system 50 may utilize additional, fewer and/or different components. Preferably, antenna 52 and receiver 54 are capable of receiving a signal transmittedfrom plug 30. As plug 30 has been discussed in relation to the measurement of glucose levels in tears, the signal transmitted from plug 30 relates to same. However, it is clear from the above discussion that a plug in accordance with the presentinvention may be designed and used to measure different materials and/or conditions within many different living organisms. FIG. 7 depicts both electronics 44 and receiver 54 as being RF technology, but as is discussed more fully above such could be adifferent technology suitable for transmission of the necessary information. Memory 56 is capable of storing information received from plug 30. This is important in revisiting or tracking certain of the information relating to the glucose levels in a person over time. Software package 58 processes information receivedfrom plug 30 so that such can be displayed on display 60. It is to be understood that depending upon the graphics being displayed on display 60, software package 58 may vary. Similarly, package 58 may vary with the type of information and/or signalbeing received from plug 30. In the embodiment shown in FIG. 7, plug 30 is powered by passive power provided by receiver system 50. Thus, system 30 is placed within a certain distance of plug 30 in order to generate a signal to be received. In thisregard, plug 30 includes a power converter for converting the passive power received from system 50. The distance required for operation of plug 30 can vary and in certain embodiments is several feet, in which case system 50 is kept on or near thepatient in order to receive continuous readings. Receiver system 50 may be a stand-alone device directed solely to receiving information from plug 30, or such may be built into another device. For example, system 50 may be a component of a larger device, such as a cell phone, personal dataassistant, watch, television, MP3 player, computer or the like. Those of ordinary skill in the art would readily recognize how system 50 could be built into one of the aforementioned other technologies. Thus, a patient could be provided with a devicenot only useful for measuring the level of glucose, but also for performing other tasks or providing other benefits. As is mentioned above, plug 30 and system 50 are capable of taking regular interval readings of the glucose level of a patient's body,and thereafter storing and displaying such information to a patient. It is contemplated that patients could be provided with charts, graphs, tables or the like relating to the various glucose measurements taken. Such would clearly be dependent uponsoftware package 58 and display 60. Many data displaying means are well-known and widely utilized, and the present invention may employ any suitable one. It is noted that a memory, like memory 56 could also be included within plug 30 in order to storeinformation relating to the glucose measurements. This information could thereafter be downloaded upon an interface between plug 30 and system 50. A system that operates in this fashion would only require intermittent communication between plug 30 andsystem 50. In addition to measuring and displaying information relating to the glucose level in a patient, the present invention may serve other benefits. Tuning back to FIGS. 1-3, when a tear gland (not shown) and/or system 10 does not operate properly,dryness of eye 1 may become a problem. Dry eye is a debilitating condition which often causes patients to have symptoms such as a feeling of dryness, and/or a feeling of having a gritty or foreign body in the eye. Dryness of the eyes often results whenthere is a paucity of lubricating tear fluid produced in eye 1. Treatment of dry eye can be the continuous administration of lubricating fluid by the patient, or more conveniently by
1.834874
Zyphra/Zyda-2
Broad generalizations are often made in popular psychology about one side or the other having characteristic labels such as "logical" for the left side or "creative" for the right. These labels need to be treated carefully; although a lateral dominance is measurable, these characteristics are in fact existent in both sides, and experimental evidence provides little support for correlating the structural differences between the sides with functional differences. Language functions such as grammar, vocabulary and literal meaning are typically lateralized to the left hemisphere, especially in right handed individuals. While language production is left-lateralized in up to 90% of right-handed subjects, it is more bilateral, or even right lateralized in approximately 50% of left-handers. In contrast, prosodic language functions, such as intonation and accentuation, often are lateralized to the right hemisphere of the brain. optic chiasm or optic chiasma (Greek χίασμα, "crossing", from the Greek χιάζω 'to mark with an X', after the Greek letter 'Χ', chi) is the part of the brain where the optic nerves (CN II) partially cross. The optic chiasm is located at the bottom of the brain immediately below the hypothalamus. One of the most important functions of the hypothalamus is to link the nervous system to the endocrine system via the pituitary gland (hypophysis). The hypothalamus is located below the thalamus, just above the brain stem. In the terminology of neuroanatomy, it forms the ventral part of the diencephalon. All vertebrate brains contain a hypothalamus. In humans, it is roughly the size of an almond. The hypothalamus is responsible for certain metabolic processes and other activities of the autonomic nervous system.
2.568403
HuggingFaceFW/fineweb-edu
Climate change is an important, current and ongoing issue. This is especially true in the Arctic region. If you are unaware of what climate change is, it is a global or regional change in weather patterns that lasts for a long period of time. Climate change is greatly caused by the increased levels of atmospheric carbon dioxide which is produced by the use of fossil fuels, such as exhaust from cars and trucks, burning trash, and factory emissions. These are also contributing to global warming which is, a gradual increase in the overall temperature of the Earth's atmosphere. Some effects of global warming in the Arctic are rising temperatures in the air and in the water surrounding the Arctic. Another is the loss of sea ice and melting of ice sheets which is caused by the increased temperatures. This also greatly impacts the Arctic plants and animals, they are rapidly dying, decreasing in numbers, possibly leading to their extinction. The melting ice sheets are destroying the wildlife population and increasing the sea level.
2.557186
m-a-p/FineFineWeb
yrimethamine(S/P) was pioneered in Ifakara, Tanzania in 1999. Infants received S/P at ages 3, 6, and 9 months in combination with their routine childhood (EPI) vaccinations. IPTi reduced clinical attacks of malaria by 59% (95% CI, 41%-72%) in Ifakara This document reflects the policy of the Government of Tanzania of ensuring availability TB and Malaria (GFATM) for their continuing support to the country and the commitment 6.7.1 Post Exposure Prophylaxis (PEP). Prevalence of malaria and anaemia among HIV infected pregnant women receiving co-trimoxazole prophylaxis in Tanzania: a cross sectional study in Kinondoni Municipality. 1. BMC Pharmacol Toxicol. 2014 Apr 24;15:24. doi: 10.1186/2050-6511-15-24 There is a high risk of malaria in all areas of Tanzania below 1,800m (including Zanzibar): atovaquone/proguanil OR doxycycline OR mefloquine recommended. There is no risk of malaria above 1,800m: bite avoidance recommended. Antimalarial Recommendations Map. Choose between static map and interactive map by selecting a tab below I have been to Africa four times - three times to East Africa (including Tanzania) and once to West. Each time I took malaria prophylaxis, malarone once and doxy the other times. I did actually get malaria when I was in Ivory Coast and I WAS taking medication (doxy) 3.4. Anti-Malarial Prophylaxis and Iron Tablets Medication Non-Compliance. Women who attended ANC during their previous pregnancy were asked about the preventative medications they received. Almost 66% reported that they received anti-malaria prophylaxis; this proportion was highest in Bariadi (78%) and lowest in Busega (54%) Tanzania: vaccinaties die verplicht zijn. Vaccinatie tegen gele koorts is voor Tanzania alleen verplicht als je in de zeven dagen voordat je Tanzania binnenkomt in een gele koorts land bent geweest. Dit advies geldt ook als je een overstap hebt gemaakt en langer dan 12 uur in het betreffende gele koorts land bent geweest Two cases of tertian malaria in travelers taking A/P for prophylaxis are presented. Case 1. A 56‐year‐old man had traveled to Madagascar, Tanzania, and India in 2002; he did not take any antimalarial prophylaxis and was diagnosed with malaria due to P falciparum that same year Demonstration Site Title: Choice of malaria prophylaxis for travel to Ghana, Tanzania and Egypt Enq. No:167 Due By: 12/05/2020 17:00:00 Comments: Answer needed by 5.00pm today. Date completed: 12/05/2020 14:30:05 Completed by: SS Reply Authorised by: Enquirer Details R___ W___ Practice Nurs You are absolutely right to think about malaria if you will travel to Tanzania while pregnant. Here are the statistiscs--About a third of people who take mefloquine (Lariam) report problems. Most of the problems are trouble sleeping and really vivid dreams that can range from merely weird to outright nightmares Malaria risk exists year round in Palawan and Mindanao Islands. Tanzania, United Republic of. All areas at elevations < 1800 m. Includes Zanzibar. Year-round. P. f. P. vivax Malaria Information and Prophylaxis, by Country. Centers for Disease Control and Prevention Of those who received anti-malaria prophylaxis, around 85% were aware that they received SP tablets and the rest reported that they received other forms of prophylaxis. Women were also asked if they swallowed the medication given and only 11% reported that they swallowed all three doses, while 27% reported they swallowed two doses and 62% reported they swallowed just the first dose Ukompliceret P. falciparum-malaria kan i almindelighed behandles oralt, og førstevalgsbehandling er artemisinin kombinationsbehandling. Ikke-markedsførte præparater i Danmark er tilgængelige på de infektionsmedicinske afdelinger. Udleveringstilladelse kan ansøges hos Lægemiddelstyrelsen. Kompliceret malaria The prevalence of malaria declined substantially in Tanzania as well; in Tanga region the decrease between 2008 and 2016 was from 10-15 % to only 1-5 %. The main objective of this study was to explore the reasons for the decline of child mortality and morbidity due to malaria in Tanga, with emphasis on mothers' knowledge of malaria This is the largest and most densely populated region in Tanzania, with a population of 2.5 million and a population density of 1793 persons per square kilometer. 13 Malaria is endemic, the prevalence of Plasmodium falciparum malaria parasitemia, ranging from 0.8% to 20%, 14,15 with a lower prevalence in urban compared with rural areas (6.8% vs 19.9%). 16 During the period of the study, first. Maloprim malaria prophylaxis in children living in a holoendemic village in north-eastern Tanzania. Msangeni, HA; Lemnge, MM; National Institute for Medical Research, Amani Centre, Tanzania. Transactions of the Royal Society of Tropical Medicine and Hygiene 1:91 199 RESEARCH ARTICLE Open Access Prevalence of malaria and anaemia among HIV infected pregnant women receiving co-trimoxazole prophylaxis in Tanzania: a cross sectional study i Tanzania has one of the highest incidences of HIV/AIDS in the world, so appropriate precautions should be taken against contracting the virus while in the country, such as practising safe sex and not sharing needles. Mosquito-borne illnesses such as malaria and dengue fever are also prevalent, particularly in rural areas BG Tanzania will start using the Malaria Safe Dashboard in 2014 to capture and report effects of their malaria investment on malaria cases and related expenses for BG Tanzania. BG Tanzania continues to be an extremely valuable Malaria Safe partner as they have increased their advocacy activities bringing on other companies to become Malaria Safe Both malaria and HIV can affect pregnancy outcomes indirectly because they are risk factors for maternal anaemia. 2,42,44,45 Malaria prophylaxis in pregnancy can reduce the incidence of third-trimester anaemia 38 and is generally recommended as a part of prenatal care in malaria-endemic areas. 46 This has been effective in reducing the incidence of LBW infants, especially those born to. A malaria prophylaxis with drugs (chemoprophylaxis) is advisable. The Zanzibar Commission for Tourism appears to reproduce information from the CIA World Factbook, which again states. Malaria is still prevalent in East Africa and so one should also take a malaria prophylaxis. There are many different kinds of medications for Malaria Übersetzung im Kontext von malaria prophylaxis in Englisch-Deutsch von Reverso Context: It is also used successfully for malaria prophylaxis and therapy Malaria has been estimated to cost Tanzania more than US$ 240 million every year in lost gross domestic product, The prophylaxis or malaria in Dar es Sa-laam, east Africa Here we'll guide you to the very best prices available today. Mefloquine Malaria Prophylaxis - A month's worth of pills is available from wholesalers for less than $20. mefloquine malaria prophylaxis Best Quality and EXTRA LOW PRICES, malaria prophylaxis mefloquin Malaria precautions Malaria Map. Malaria risk is high throughout the year in the whole country, but low in Nairobi, the immediate surrounding areas, and the highlands (above 2500m) of Central, Eastern, Nyanza, Rift Valley and Western Provinces. Note that there can be a high risk in valleys of the highlands. Malaria precautions are essentia For Tanzania, proof of a yellow fever vaccine administration is actually required to enter the country! It's also advisable to receive the typhoid vaccine; polio and tetanus booster; and Hepatitis A. Then there's the malaria dilemma. There is no vaccine against malaria but there are malaria prophylaxis The following pages present country-specific information on yellow fever (YF) vaccine requirements and recommendations (Table 2-6) and malaria transmission information and prophylaxis recommendations.Country-specific maps of malaria transmission areas, country-specific maps depicting yellow fever vaccine recommendations, and a reference map of China are included to aid in interpreting the. Prevalence of malaria and anaemia among HIV infected. Parasite clearance, cure rate, post-treatment prophylaxis and safety of standard 3-day versus an extended 6-day treatment of artemether-lumefantrine and a single low-dose primaquine for uncomplicated Plasmodium falciparum malaria in Bagamoyo district, Tanzania- a randomized controlled trial According to the latest bulletin, it is no longer compulsory to have the yellow fever vaccination to enter Tanzania. Nevertheless, this rule seems to change every few months so it may still be wise
1.361584
m-a-p/FineFineWeb
, but in most cases, acid reflux disorder can actually be managed effectively with an individual GERD diet so patients can reach a point where they enjoy eating again. Yes, it does require some time and patience, but the relief is well worth the effort. By keeping a journal, you will be able to identify the 'trigger' foods and create a GERD diet plan that prevents GERD symptoms as well as improving your overall health. In many cases, a proper GERD diet can improve your condition enough that medications may be reduced or even eliminated. Of course, you should not discontinue prescriptions without your doctor's approval, but many patients have reported significant improvement simply from a GERD diet alone. And, for those who require more intervention, there is such a variety of treatments that you should be able to find one that works for you. Whether it is over the counter drugs, prescription medications, natural remedies for GERD, or surgery, this disease is treatable and most complications can be avoided if the condition is handled properly. So, say goodbye to acid reflux and prepare yourself a GERD diet meal that will bring you pleasure without all the pain. What Would You Like to Read Now After This Article on GERD Diet? Go to the top of this article about GERD Diet Disclaimer for
1.372235
Zyphra/Zyda-2
step. This assumption can trigger numerical instabilities or result in a loss of accuracy, which, in turn, would require reducing the time steps size. This paper focuses on reducing the time discretization error without requiring additional MC transport solutions and hence with no major computational overhead. The sub-step method presented here accounts for the reaction rate variation due to the variation in nuclide densities and thermal hydraulic (TH) conditions. This is achieved by performing additional depletion and TH calculations within the analyzed time step. The method was implemented in BGCore code and subsequently used to analyze a series of test cases. The results indicate that computational speedup of up to a factor of 10 may be achieved over the existing coupling schemes. 9. A small step in VLC systems - a big step in Li-Fi implementation Science.gov (United States) Rîurean, S. M.; Nagy, A. A.; Leba, M.; Ionica, A. C. 2018-01-01 Light is part of our sustainable environmental life so, using it would be the handiest and cheapest way for wireless communication. Since ever, light has been used to send messages in different ways and now, due to the high technological improvements, bits through light, at high speed on multiple paths, allow humans to communicate. Using the lighting system both for illumination and communication represents lately one of the worldwide main research issues with several implementations with real benefits. This paper presents a viable VLC system, that proves its sustainability for sending by light information not only few millimetres but meters away. This system has multiple potential applications in different areas where other communication systems are bottlenecked, too expensive, unavailable or even forbidden. Since a Li-Fi fully developed system requires bidirectional, multiple access communication, there are still some challenges towards a functional Li-Fi wireless network. Although important steps have been made, Li-Fi is still under experimental stage. 10. Atomic Step Formation on Sapphire Surface in Ultra-precision Manufacturing Science.gov (United States) Wang, Rongrong; Guo, Dan; Xie, Guoxin; Pan, Guoshun 2016-01-01 Surfaces with controlled atomic step structures as substrates are highly relevant to desirable performances of materials grown on them, such as light emitting diode (LED) epitaxial layers, nanotubes and nanoribbons. However, very limited attention has been paid to the step formation in manufacturing process. In the present work, investigations have been conducted into this step formation mechanism on the sapphire c (0001) surface by using both experiments and simulations. The step evolutions at different stages in the polishing process were investigated with atomic force microscopy (AFM) and high resolution transmission electron microscopy (HRTEM). The simulation of idealized steps was constructed theoretically on the basis of experimental results. It was found that (1) the subtle atomic structures (e.g., steps with different sawteeth, as well as steps with straight and zigzag edges), (2) the periodicity and (3) the degree of order of the steps were all dependent on surface composition and miscut direction (step edge direction). A comparison between experimental results and idealized step models of different surface compositions has been made. It has been found that the structure on the polished surface was in accordance with some surface compositions (the model of single-atom steps: Al steps or O steps). PMID:27444267 11. Lateral step initiation behavior in older adults OpenAIRE Sparto, Patrick J; Jennings, J Richard; Furman, Joseph M; Redfern, Mark S 2013-01-01 Older adults have varied postural responses during induced and voluntary lateral stepping. The purpose of the research was to quantify the occurrence of different stepping strategies during lateral step initiation in older adults and to relate the stepping responses to retrospective history of falls. Seventy community-ambulating older adults (mean age 76 y, range 70–94 y) performed voluntary lateral steps as quickly as possible to the right or left in response to a visual cue, in a blocked de... 12. Competition Between Hydrotreating and Polymerization Reactions During Pyrolysis Oil Hydrodeoxygenation NARCIS (Netherlands) Mercader, F. De Miguel; Koehorst, P. J. J.; Heeres, H. J.; Kersten, S. R. A.; Hogendoorn, J. A. 2011-01-01 Hydrodeoxygenation (HDO) of pyrolysis oil is an upgrading step that allows further coprocessing of the oil product in (laboratory-scale) standard refinery units to produce advanced biofuels. During HDO, desired hydrotreating reactions are in competition with polymerization reactions that can lead to 13. Unconventional Passerini Reaction toward α-Aminoxy-amides NARCIS (Netherlands) Chandgude, Ajay L; Dömling, Alexander 2016-01-01 The Passerini multicomponent reaction (P-3CR) toward the one-step synthesis of α-aminoxy-amide, by employing for the first time a N-hydroxamic acid component, has been reported. The sonication-accelerated, catalyst-free, simple, fast, and highly efficient Passerini reaction is used for the synthesis 14. Propargylamine-isothiocyanate reaction: efficient conjugation chemistry in aqueous media DEFF Research Database (Denmark) Viart, Helene Marie-France; Larsen, T. S.; Tassone, Chiara 2014-01-01 A coupling reaction between secondary propargyl amines and isothiocyanates in aqueous media is described. The reaction is high-yielding and affords cyclized products within 2-24 h. A functionalized ether lipid was synthesized in 8 steps, formulated as liposomes with POPC and conjugated to FITC un... 15. Composers on stage DEFF Research Database (Denmark) Groth, Sanne Krogh A trend on the scene of contemporary music is composers going on stage, performing their pieces themselves. Within a discourse of popular music, this is more the rule than exception, but when it comes to the context of contemporary scored music, the historical and aesthetic context differs......, and something quite different is undergoing. This paper intends to discuss three examples of performances in which the composer's appearance on stage was an important part of the piece, - both when it came to the role as a performer and as an individual person – as representer and presenter. The paper intends... 16. Biomechanical influences on balance recovery by stepping. Science.gov (United States) Hsiao, E T; Robinovitch, S N 1999-10-01 Stepping represents a common means for balance recovery after a perturbation to upright posture. Yet little is known regarding the biomechanical factors which determine whether a step succeeds in preventing a fall. In the present study, we developed a simple pendulum-spring model of balance recovery by stepping, and used this to assess how step length and step contact time influence the effort (leg contact force) and feasibility of balance recovery by stepping. We then compared model predictions of step characteristics which minimize leg contact force to experimentally observed values over a range of perturbation strengths. At all perturbation levels, experimentally observed step execution times were higher than optimal, and step lengths were smaller than optimal. However, the predicted increase in leg contact force associated with these deviations was substantial only for large perturbations. Furthermore, increases in the strength of the perturbation caused subjects to take larger, quicker steps, which reduced their predicted leg contact force. We interpret these data to reflect young subjects' desire to minimize recovery effort, subject to neuromuscular constraints on step execution time and step length. Finally, our model predicts that successful balance recovery by stepping is governed by a coupling between step length, step execution time, and leg strength, so that the feasibility of balance recovery decreases unless declines in one capacity are offset by enhancements in the others. This suggests that one's risk for falls may be affected more by small but diffuse neuromuscular impairments than by larger impairment in a single motor capacity. 17. Are stage IV vestibular schwannomas preoperatively different from other stages? Science.gov (United States) Tringali, Stéphane; Dubreuil, Christian; Zaouche, Sandra; Ferber-Viart, Chantal 2008-01-01 The aim of this study was to focus on the clinical and paraclinical symptoms of patients suffering from Stage IV vestibular schwannomas (VSs). In this prospective study, we included 734 patients who have VS and candidates for operation. Patients were classified as having Stage I, II, III, or IV tumors according to Tos criteria as evaluated by magnetic resonance imaging. PREOPERATIVE CLINICAL EVALUATION: We recorded the occurrence of complaints (%) and duration (yr) of hearing loss, tinnitus, and balance disorder. Preoperative paraclinical evaluation included pure-tone (PTA) and speech audiometry, auditory brainstem response (ABR) patterns, and vestibular deficit at videonystamography (VNG). Continuous variables were compared between Stage IV and other stages using analysis of variance. Qualitative variables expressed as a percentage of presence were compared between Stage IV and other stages using percentage comparison. Quantitative Parameters. Patients with Stage IV VS were significantly younger as compared with patients
1.596863
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
Calculating covariability Covariability should be mentioned in absolute conditions by the covariance or in relative terms and conditions by relationship coefficient - A positive covariance shows that the newest output relocate an identical instructions such as Good and you may B. - A bad covariance reveals that the new productivity relocate opposite instructions as in Good and you can C. - A zero covariance demonstrates that new returns are separate of each and every almost every other as with A great and you may D. For completeness, the fresh computations of your own covariances out of raw studies are included. However, this approach isn't needed on the exam, given that exam issues will generally hold the covariances whenever called for. Predicated on our initial knowledge of the risk-go back relationship, if dealers need to cure its chance they have so you're able to undertake less go back Actually, the correlation coefficient ranging from returns on investment will lay anywhere between 0 and you will +step 1. This is the standard for the a two-investment collection to get to a partial reduction of chance (the quality departure away from a-two-investment collection try lower than new adjusted mediocre of your standard departure of the person investments). Therefore, we're going to need another formula to estimate the risk (basic deviation of productivity) into the a two -advantage collection. The newest formula will think about the chance (fundamental departure off returns) off each other assets but also have to make use of a measure off covariability because affects the amount of exposure cures. The first several terminology deal with the risk of the individual investment. The next identity is one of interesting that whilst takes into account precisely how this new returns for each group of opportunities co-are different. Brand new covariance identity are multiplied from the double brand new proportions committed to for each and every investment, because it considers brand new covariance of Good and you may B and of B and you can An excellent, being obviously a similar. Notice the actual only real difference in the two models is the fact that the covariance throughout the 2nd version are broken down towards the its constituent pieces, ie Another types of brand new formula is the one that's usually used in exams and it is the one that is offered into the algorithm layer Conclusion desk Resource Asked Fundamental go back (%) deviation (%) Port An effective + B 20 cuatro.47 Port A good + C 20 0.00 Port A good + D 20 3.16 A + C is the most effective profile because has the low amount of chance to own a given quantity of go back. Prime bad correlation does not occur amongst the production to your a couple opportunities in the real-world, ie risk can't be removed, though it is right knowing the fresh theoretical extremes. Yet not, while the currently stated, in fact the new correlation coefficients between production toward investments commonly rest ranging from 0 and you can +1. In fact, the brand new output into the investments in identical ebonyflirt nasıl kullanılır business generally have a leading confident relationship of around 0.9, since returns to your assets in various marketplaces tend to have a minimal positive relationship of approximately 0.dos. For this reason buyers have a preference to buy other opportunities therefore aiming to perform a proper- varied profile, making certain that the maximum exposure avoidance feeling was received. The brand new correlation coefficient since a family member way of measuring covariability conveys the newest energy of your matchmaking between your production with the one or two opportunities Although not, portfolio principle suggests all of us that it is it is possible to to attenuate exposure with out an excellent consequential reduction in come back. That is proved successfully, once the good portfolio's requested come back is equivalent to the brand new weighted mediocre of the expected productivity on the personal financial investments, whereas a beneficial portfolio's exposure are below new adjusted mediocre out of the possibility of the individual investment considering the chance protection effect of variation for the reason that the fresh new correlation coefficient becoming below +step 1.
1.122833
m-a-p/FineFineWeb
The example sentence in Why is も used instead of が in the sentence 「日本ではクモを見ると良いことがあると言う人もいますよ」, got me thinking "Why is it using で, not に?". I.e., why not It seems obvious that 日本では is intended to modify います. If it were modifying 言う, the meaning would be roughly "There are people who - when in Japan - say that...". Although I would personally use に in this sentence, it doesn't sound completely ungrammatical to me as it is. So why is that, given that いる usually takes に, not で?
1.61322
HuggingFaceFW/fineweb-edu